SlideShare a Scribd company logo
1 of 7
Cloud Computing
Unit – 4
RESOURCE MANAGEMENT AND
SECURITY IN CLOUD
SECURITY IN CLOUD
• The architecture of a cloud is developed at three layers: infrastructure, platform,
and application.
Cloud Security Challenges
• Lose control over physical security
• Storage services created by one vendor may be incompatible with another vendor
services
• If information is encrypted while passing through the cloud, who controls the
encryption/decryption keys
• Ensuring the integrity of data.
• Cloud applications undergo constant features additions, and user must keep up to
date with application improvements
• Having proper fail-over technology is a component of securing the cloud that is
often overlooked.
Software-as-a-Service Security
• Privileged user access
• Regulatory compliance
• Data location
• Data segregation
• Recovery
• Investigative support
• Long-term viability
Software-as-a-Service Security
• Security Management (People)
• Security Governance
• Risk Management
• Risk Assessment
• Security Portfolio Management
• Security Awareness
• Education and Training
• Policies, Standards, and Guidelines
• Secure Software Development Life Cycle (SecSDLC)
• Security Monitoring and Incident Response
• Third-Party Risk Management
Software-as-a-Service Security
• Requests for Information and Sales Support
• Business Continuity Plan
• Forensics
• Security Architecture Design
• Vulnerability Assessment
• Password Assurance Testing
• Logging for Compliance and Security Investigations
• Security Images
• Data Privacy
• Data Governance
• Data Security
Software-as-a-Service Security
• Application Security
• Virtual Machine Security
• Identity Access Management (IAM)
• Change Management
• Physical Security
• Business Continuity and Disaster Recovery
• The Business Continuity Plan

More Related Content

Similar to UNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUD

Cloud Security Training Crash Course
Cloud Security Training Crash CourseCloud Security Training Crash Course
Cloud Security Training Crash Course
Bryan Len
 

Similar to UNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUD (20)

Cloud_Security.pptx
Cloud_Security.pptxCloud_Security.pptx
Cloud_Security.pptx
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
4831586.ppt
4831586.ppt4831586.ppt
4831586.ppt
 
Cloud Security Training Crash Course
Cloud Security Training Crash CourseCloud Security Training Crash Course
Cloud Security Training Crash Course
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Security Design Concepts
Security Design ConceptsSecurity Design Concepts
Security Design Concepts
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Trust, security and privacy issues with cloud erp
Trust, security and privacy issues with cloud erpTrust, security and privacy issues with cloud erp
Trust, security and privacy issues with cloud erp
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
3.pptx
3.pptx3.pptx
3.pptx
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 

UNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUD

  • 1. Cloud Computing Unit – 4 RESOURCE MANAGEMENT AND SECURITY IN CLOUD
  • 2. SECURITY IN CLOUD • The architecture of a cloud is developed at three layers: infrastructure, platform, and application.
  • 3. Cloud Security Challenges • Lose control over physical security • Storage services created by one vendor may be incompatible with another vendor services • If information is encrypted while passing through the cloud, who controls the encryption/decryption keys • Ensuring the integrity of data. • Cloud applications undergo constant features additions, and user must keep up to date with application improvements • Having proper fail-over technology is a component of securing the cloud that is often overlooked.
  • 4. Software-as-a-Service Security • Privileged user access • Regulatory compliance • Data location • Data segregation • Recovery • Investigative support • Long-term viability
  • 5. Software-as-a-Service Security • Security Management (People) • Security Governance • Risk Management • Risk Assessment • Security Portfolio Management • Security Awareness • Education and Training • Policies, Standards, and Guidelines • Secure Software Development Life Cycle (SecSDLC) • Security Monitoring and Incident Response • Third-Party Risk Management
  • 6. Software-as-a-Service Security • Requests for Information and Sales Support • Business Continuity Plan • Forensics • Security Architecture Design • Vulnerability Assessment • Password Assurance Testing • Logging for Compliance and Security Investigations • Security Images • Data Privacy • Data Governance • Data Security
  • 7. Software-as-a-Service Security • Application Security • Virtual Machine Security • Identity Access Management (IAM) • Change Management • Physical Security • Business Continuity and Disaster Recovery • The Business Continuity Plan