Top Threats and Essential Cloud Security Concepts and Controls
In the last chapter, you studied cloud reference architectures, cloud service models, cloud deployment models, and their inherent capabilities. In this chapter, you will discuss security concepts that are relevant to cloud computing and review some of the common threats to cloud deployments. The chapter will introduce the most common control categories and control types necessary to secure data, network, and virtualization layers for cloud computing.
By the end of this chapter, you will be able to confidently answer questions on the following topics:
- The CIA triad—confidentiality, integrity, and availability
- Common threats to cloud deployments
- Enterprise security control categories and types