当前位置:网站首页>[etc.] what are the security objectives and implementation methods that cloud computing security expansion requires to focus on?
[etc.] what are the security objectives and implementation methods that cloud computing security expansion requires to focus on?
2022-07-07 13:13:00 【Xingyun housekeeper】
Equal insurance 2.0 In policy , Cloud computing security extension requirements are additional security requirements that need to be implemented in addition to the general security requirements proposed for the cloud computing platform . But in practice , It usually needs to be identified in the operation instructions . Today, let's talk about , Comprehensively consider the principles for distinguishing the security objectives and implementation methods that cloud computing security expansion requires to focus on ?
Principle one : Only pay attention to the security protection of the cloud computing platform ( Such as the requirements of infrastructure location ), Or the security requirements related to the basic security services provided by the cloud computing platform to cloud service customers ( Such as the requirements for virtual network isolation of different cloud service customers ), Only applicable to cloud computing platforms .
Principle two : Pay attention to the cloud computing platform to provide cloud service customers and need customers “ Self operation ” Safety requirements related to safety services ( Such as the security clauses that ensure that the cloud service provider can audit the operations of cloud service customers ), It is also applicable to cloud computing platforms and cloud service customer business systems .
Principle three : Pay attention to the security requirements of the respective security protection requirements of the cloud computing platform and the cloud service customer business system ( Such as virtual network boundary access control requirements ), It is also applicable to cloud computing platforms and cloud service customer business systems .
Principle four : Only pay attention to the security requirements of cloud service customers ( Such as “ Cloud service providers choose ” Safety requirements in control points ), Only applicable to cloud service customer business system .
【 Knowledge development 】: Equal insurance 2.0 What are the security extension requirements of cloud computing ?
Cloud computing security extension requirements are additional security requirements that need to be implemented in addition to the general security requirements proposed for the cloud computing platform . The main contents include “ Location of infrastructure ”、“ Virtualization security ”、“ Mirror and snapshot protection ”、“ Cloud computing environment management ” and “ Cloud service providers choose ” etc. .
边栏推荐
- About the problem of APP flash back after appium starts the app - (solved)
- ESP32系列专栏
- 【Presto Profile系列】Timeline使用
- 一文读懂数仓中的pg_stat
- LIS 最长上升子序列问题(动态规划、贪心+二分)
- MongoDB复制(副本集)总结
- Signal strength (RSSI) knowledge sorting
- How does MySQL create, delete, and view indexes?
- Per capita Swiss number series, Swiss number 4 generation JS reverse analysis
- Shortcut key of Bash
猜你喜欢
[learning notes] zkw segment tree
Smart cloud health listed: with a market value of HK $15billion, SIG Jingwei and Jingxin fund are shareholders
PACP学习笔记一:使用 PCAP 编程
Cinnamon Applet 入门
Practical example of propeller easydl: automatic scratch recognition of industrial parts
存储过程的介绍与基本使用
Blog recommendation | Apache pulsar cross regional replication scheme selection practice
Aosikang biological sprint scientific innovation board of Hillhouse Investment: annual revenue of 450million yuan, lost cooperation with kangxinuo
滑轨步进电机调试(全国海洋航行器大赛)(STM32主控)
How to continue after handling chain interruption / sub chain error removed from scheduling
随机推荐
MySQL master-slave replication
Pay close attention to the work of safety production and make every effort to ensure the safety of people's lives and property
我那“不好惹”的00后下属:不差钱,怼领导,抵制加班
shell 批量文件名(不含扩展名)小写改大写
靠卖概念上市,认养一头牛能走多远?
Grep of three swordsmen in text processing
JS function 返回多个值
分布式事务解决方案
test
TPG x AIDU|AI领军人才招募计划进行中!
MongoDB优化的几点原则
Japanese government and enterprise employees got drunk and lost 460000 information USB flash drives. They publicly apologized and disclosed password rules
PACP学习笔记一:使用 PCAP 编程
Analysis of DHCP dynamic host setting protocol
国泰君安证券开户怎么开的?开户安全吗?
初学XML
ORACLE进阶(五)SCHEMA解惑
What are the benefits of ip2long?
信号强度(RSSI)知识整理
迅为iTOP-IMX6ULL开发板Pinctrl和GPIO子系统实验-修改设备树文件