当前位置:网站首页>Xin'an Second Edition: Chapter 23 cloud computing security requirements analysis and security protection engineering learning notes
Xin'an Second Edition: Chapter 23 cloud computing security requirements analysis and security protection engineering learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
One 、 The outline of this chapter requires
6. Cloud computing security requirements analysis and security protection engineering
6.1 Cloud computing security threats and needs analysis
6.1.1 Cloud computing security threats
◆ Cloud computing user security threats
◆ Cloud computing platform security threats
◆ Virtual machine security threats
◆ Cloud platform operation and maintenance security threats
6.1.2 Cloud computing security requirements
◆ Cloud operating system security
◆ Cloud service security compliance
◆ Multi tenant security isolation
◆ Data hosting
◆ Privacy protection
6.2 Cloud computing security protection mechanism and technical scheme
6.2.1 Cloud computing security level protection framework
◆ Security classification of cloud computing protection objects
◆ Cloud computing protection object security protection methods
◆ Cloud computing security level protection design framework
6.2.2 Cloud computing security protection
◆ Physical and environmental security ( Traditional physical environment security 、 Cloud computing platform physical location selection )
◆ Network and communication security 【 Network communication security 、 Network boundary security, etc , It involves infrastructure as a service (laaS) Security 】
◆ Device and computing security 【 Resource control 、 Image and snapshot protection , Involving platform as a service (PaaS) Security 】
◆ Application and data security 【 Software fault tolerance 、 Resource control 、 Interface security 、 Data integrity 、 Data confidentiality 、 Data backup recovery 、 Residual information protection 、 Personal information protection, etc , Involving software as a service (SaaS) Security 】
◆ Cloud user security ( Identity identification and authentication of cloud users 、 Cloud user access control )
6.2.3 Cloud computing security management
◆ Security policy and management system
◆ Safety management organization and personnel
◆ Safety management object
6.2.4 Cloud computing security operation and maintenance
◆ Cloud computing environment and asset operation and maintenance management
◆ Security vulnerability inspection and risk analysis of cloud computing system
◆ Cloud computing system security equipment and policy maintenance
◆ Cloud computing system security supervision
◆ Security monitoring and emergency response of cloud computing system
边栏推荐
- Serial serialold parnew of JVM garbage collector
- 关于Selenium启动Chrome浏览器闪退问题
- Akamai 反混淆篇
- 自动化运维利器ansible基础
- Shawshank's sense of redemption
- [VNCTF 2022]ezmath wp
- PySpark算子处理空间数据全解析(4): 先说说空间运算
- Redis快速入门
- 2021-03-22 "display login screen during recovery" can't be canceled. The appearance of lock screen interface leads to the solution that the remotely connected virtual machine can't work normally
- List集合数据移除(List.subList.clear)
猜你喜欢

Final review of information and network security (based on the key points given by the teacher)

The most complete tcpdump and Wireshark packet capturing practice in the whole network

05个人研发的产品及推广-数据同步工具

Flink analysis (I): basic concept analysis

Shawshank's sense of redemption

Flink 解析(三):内存管理

List set data removal (list.sublist.clear)

03个人研发的产品及推广-计划服务配置器V3.0

基于LNMP部署flask项目

07个人研发的产品及推广-人力资源信息管理系统
随机推荐
华为认证云计算HICA
[reverse intermediate] eager to try
Uipath browser performs actions in the new tab
Idea breakpoint debugging skills, multiple dynamic diagram package teaching package meeting.
TCP连接不止用TCP协议沟通
Only learning C can live up to expectations top2 P1 variable
Flexible report v1.0 (simple version)
吴军三部曲见识(四) 大家智慧
Precipitated database operation class - version C (SQL Server)
DataGridView scroll bar positioning in C WinForm
JVM garbage collector part 1
Integrated development management platform
MySQL报错解决
沉淀下来的数据库操作类-C#版(SQL Server)
03 products and promotion developed by individuals - plan service configurator v3.0
Wu Jun's trilogy experience (VII) the essence of Commerce
Garbage first of JVM garbage collector
Flink源码解读(三):ExecutionGraph源码解读
Redis快速入门
[VNCTF 2022]ezmath wp