当前位置:网站首页>Xin'an Second Edition: Chapter 23 cloud computing security requirements analysis and security protection engineering learning notes
Xin'an Second Edition: Chapter 23 cloud computing security requirements analysis and security protection engineering learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
One 、 The outline of this chapter requires
6. Cloud computing security requirements analysis and security protection engineering
6.1 Cloud computing security threats and needs analysis
6.1.1 Cloud computing security threats
◆ Cloud computing user security threats
◆ Cloud computing platform security threats
◆ Virtual machine security threats
◆ Cloud platform operation and maintenance security threats
6.1.2 Cloud computing security requirements
◆ Cloud operating system security
◆ Cloud service security compliance
◆ Multi tenant security isolation
◆ Data hosting
◆ Privacy protection
6.2 Cloud computing security protection mechanism and technical scheme
6.2.1 Cloud computing security level protection framework
◆ Security classification of cloud computing protection objects
◆ Cloud computing protection object security protection methods
◆ Cloud computing security level protection design framework
6.2.2 Cloud computing security protection
◆ Physical and environmental security ( Traditional physical environment security 、 Cloud computing platform physical location selection )
◆ Network and communication security 【 Network communication security 、 Network boundary security, etc , It involves infrastructure as a service (laaS) Security 】
◆ Device and computing security 【 Resource control 、 Image and snapshot protection , Involving platform as a service (PaaS) Security 】
◆ Application and data security 【 Software fault tolerance 、 Resource control 、 Interface security 、 Data integrity 、 Data confidentiality 、 Data backup recovery 、 Residual information protection 、 Personal information protection, etc , Involving software as a service (SaaS) Security 】
◆ Cloud user security ( Identity identification and authentication of cloud users 、 Cloud user access control )
6.2.3 Cloud computing security management
◆ Security policy and management system
◆ Safety management organization and personnel
◆ Safety management object
6.2.4 Cloud computing security operation and maintenance
◆ Cloud computing environment and asset operation and maintenance management
◆ Security vulnerability inspection and risk analysis of cloud computing system
◆ Cloud computing system security equipment and policy maintenance
◆ Cloud computing system security supervision
◆ Security monitoring and emergency response of cloud computing system
边栏推荐
- Flink源码解读(一):StreamGraph源码解读
- connection reset by peer
- 网络分层概念及基本知识
- Interpretation of Flink source code (II): Interpretation of jobgraph source code
- 灵活报表v1.0(简单版)
- CTF reverse entry question - dice
- Only learning C can live up to expectations Top1 environment configuration
- Program counter of JVM runtime data area
- Flink parsing (IV): recovery mechanism
- About selenium starting Chrome browser flash back
猜你喜欢
JVM之垃圾回收器下篇
【Elastic】Elastic缺少xpack无法创建模板 unknown setting index.lifecycle.name index.lifecycle.rollover_alias
Models used in data warehouse modeling and layered introduction
06 products and promotion developed by individuals - code statistical tools
[reverse] repair IAT and close ASLR after shelling
Serial serialold parnew of JVM garbage collector
Flink源码解读(二):JobGraph源码解读
【逆向】脱壳后修复IAT并关闭ASLR
连接局域网MySql
1. Introduction to JVM
随机推荐
yarn : 无法加载文件 D:\ProgramFiles\nodejs\yarn.ps1,因为在此系统上禁止运行脚本
关于Selenium启动Chrome浏览器闪退问题
Total / statistics function of MySQL
学习投资大师的智慧
基于LNMP部署flask项目
JVM garbage collector part 1
JVM之垃圾回收器下篇
Idea breakpoint debugging skills, multiple dynamic diagram package teaching package meeting.
04个人研发的产品及推广-数据推送工具
Flink源码解读(三):ExecutionGraph源码解读
How does wechat prevent withdrawal come true?
Final review of information and network security (full version)
[mmdetection] solves the installation problem
自动化运维利器ansible基础
JUnit unit test
07 personal R & D products and promotion - human resources information management system
EasyRE WriteUp
Re signal writeup
信息与网络安全期末复习(完整版)
Programmer orientation problem solving methodology