当前位置:网站首页>[etc.] what are the security objectives and implementation methods that cloud computing security expansion requires to focus on?
[etc.] what are the security objectives and implementation methods that cloud computing security expansion requires to focus on?
2022-07-07 13:13:00 【Xingyun housekeeper】
Equal insurance 2.0 In policy , Cloud computing security extension requirements are additional security requirements that need to be implemented in addition to the general security requirements proposed for the cloud computing platform . But in practice , It usually needs to be identified in the operation instructions . Today, let's talk about , Comprehensively consider the principles for distinguishing the security objectives and implementation methods that cloud computing security expansion requires to focus on ?
Principle one : Only pay attention to the security protection of the cloud computing platform ( Such as the requirements of infrastructure location ), Or the security requirements related to the basic security services provided by the cloud computing platform to cloud service customers ( Such as the requirements for virtual network isolation of different cloud service customers ), Only applicable to cloud computing platforms .
Principle two : Pay attention to the cloud computing platform to provide cloud service customers and need customers “ Self operation ” Safety requirements related to safety services ( Such as the security clauses that ensure that the cloud service provider can audit the operations of cloud service customers ), It is also applicable to cloud computing platforms and cloud service customer business systems .
Principle three : Pay attention to the security requirements of the respective security protection requirements of the cloud computing platform and the cloud service customer business system ( Such as virtual network boundary access control requirements ), It is also applicable to cloud computing platforms and cloud service customer business systems .
Principle four : Only pay attention to the security requirements of cloud service customers ( Such as “ Cloud service providers choose ” Safety requirements in control points ), Only applicable to cloud service customer business system .
【 Knowledge development 】: Equal insurance 2.0 What are the security extension requirements of cloud computing ?
Cloud computing security extension requirements are additional security requirements that need to be implemented in addition to the general security requirements proposed for the cloud computing platform . The main contents include “ Location of infrastructure ”、“ Virtualization security ”、“ Mirror and snapshot protection ”、“ Cloud computing environment management ” and “ Cloud service providers choose ” etc. .
边栏推荐
- Cmu15445 (fall 2019) project 2 - hash table details
- 认养一头牛冲刺A股:拟募资18.5亿 徐晓波持股近40%
- Introduce six open source protocols in detail (instructions for programmers)
- Common text processing tools
- [untitled]
- Scrapy教程经典实战【新概念英语】
- 抓细抓实抓好安全生产各项工作 全力确保人民群众生命财产安全
- 【无标题】
- Go language learning notes - structure
- Analysis of DHCP dynamic host setting protocol
猜你喜欢

About how appium closes apps (resolved)

Analysis of DHCP dynamic host setting protocol

Ogre入门尝鲜

迅为iTOP-IMX6ULL开发板Pinctrl和GPIO子系统实验-修改设备树文件

HZOJ #240. Graphic printing IV

10 张图打开 CPU 缓存一致性的大门

线程池拒绝策略最佳实践

OSI 七层模型

Smart cloud health listed: with a market value of HK $15billion, SIG Jingwei and Jingxin fund are shareholders

【无标题】
随机推荐
[Presto profile series] timeline use
【Presto Profile系列】Timeline使用
我那“不好惹”的00后下属:不差钱,怼领导,抵制加班
AUTOCAD——大于180度的角度标注、CAD直径符号怎么输入?
存储过程的介绍与基本使用
How to continue after handling chain interruption / sub chain error removed from scheduling
File operation command
Unity 构建错误:当前上下文中不存在名称“EditorUtility”
Adopt a cow to sprint A shares: it plans to raise 1.85 billion yuan, and Xu Xiaobo holds nearly 40%
DETR介绍
信号强度(RSSI)知识整理
学习突围2 - 关于高效学习的方法
[untitled]
云检测2020:用于高分辨率遥感图像中云检测的自注意力生成对抗网络Self-Attentive Generative Adversarial Network for Cloud Detection
一文读懂数仓中的pg_stat
MongoDB优化的几点原则
MATLAB中polarscatter函数使用
Cloud detection 2020: self attention generation countermeasure network for cloud detection in high-resolution remote sensing images
MySQL master-slave replication
COSCon'22 社区召集令来啦!Open the World,邀请所有社区一起拥抱开源,打开新世界~