当前位置:网站首页>[etc.] what are the security objectives and implementation methods that cloud computing security expansion requires to focus on?
[etc.] what are the security objectives and implementation methods that cloud computing security expansion requires to focus on?
2022-07-07 13:13:00 【Xingyun housekeeper】
Equal insurance 2.0 In policy , Cloud computing security extension requirements are additional security requirements that need to be implemented in addition to the general security requirements proposed for the cloud computing platform . But in practice , It usually needs to be identified in the operation instructions . Today, let's talk about , Comprehensively consider the principles for distinguishing the security objectives and implementation methods that cloud computing security expansion requires to focus on ?
Principle one : Only pay attention to the security protection of the cloud computing platform ( Such as the requirements of infrastructure location ), Or the security requirements related to the basic security services provided by the cloud computing platform to cloud service customers ( Such as the requirements for virtual network isolation of different cloud service customers ), Only applicable to cloud computing platforms .
Principle two : Pay attention to the cloud computing platform to provide cloud service customers and need customers “ Self operation ” Safety requirements related to safety services ( Such as the security clauses that ensure that the cloud service provider can audit the operations of cloud service customers ), It is also applicable to cloud computing platforms and cloud service customer business systems .
Principle three : Pay attention to the security requirements of the respective security protection requirements of the cloud computing platform and the cloud service customer business system ( Such as virtual network boundary access control requirements ), It is also applicable to cloud computing platforms and cloud service customer business systems .
Principle four : Only pay attention to the security requirements of cloud service customers ( Such as “ Cloud service providers choose ” Safety requirements in control points ), Only applicable to cloud service customer business system .
【 Knowledge development 】: Equal insurance 2.0 What are the security extension requirements of cloud computing ?
Cloud computing security extension requirements are additional security requirements that need to be implemented in addition to the general security requirements proposed for the cloud computing platform . The main contents include “ Location of infrastructure ”、“ Virtualization security ”、“ Mirror and snapshot protection ”、“ Cloud computing environment management ” and “ Cloud service providers choose ” etc. .
边栏推荐
猜你喜欢
Cinnamon Applet 入门
[learning notes] agc010
Ogre入门尝鲜
COSCon'22 社区召集令来啦!Open the World,邀请所有社区一起拥抱开源,打开新世界~
Cinnamon 任务栏网速
记一次 .NET 某新能源系统 线程疯涨 分析
ESP32构解工程添加组件
Differences between MySQL storage engine MyISAM and InnoDB
“新红旗杯”桌面应用创意大赛2022
Blog recommendation | Apache pulsar cross regional replication scheme selection practice
随机推荐
Practical case: using MYCAT to realize read-write separation of MySQL
Go语言学习笔记-结构体(Struct)
Milkdown 控件图标
《开源圆桌派》第十一期“冰与火之歌”——如何平衡开源与安全间的天然矛盾?
为租客提供帮助
Cmu15445 (fall 2019) project 2 - hash table details
一文读懂数仓中的pg_stat
Cinnamon 任务栏网速
云检测2020:用于高分辨率遥感图像中云检测的自注意力生成对抗网络Self-Attentive Generative Adversarial Network for Cloud Detection
[learning notes] segment tree selection
解决缓存击穿问题
Practical example of propeller easydl: automatic scratch recognition of industrial parts
【等保】云计算安全扩展要求关注的安全目标和实现方式区分原则有哪些?
国泰君安证券开户怎么开的?开户安全吗?
Query whether a field has an index with MySQL
MongoDB优化的几点原则
简单好用的代码规范
环境配置篇
User management summary of mongodb
How to reset Google browser? Google Chrome restore default settings?