当前位置:网站首页>[etc.] what are the security objectives and implementation methods that cloud computing security expansion requires to focus on?
[etc.] what are the security objectives and implementation methods that cloud computing security expansion requires to focus on?
2022-07-07 13:13:00 【Xingyun housekeeper】
Equal insurance 2.0 In policy , Cloud computing security extension requirements are additional security requirements that need to be implemented in addition to the general security requirements proposed for the cloud computing platform . But in practice , It usually needs to be identified in the operation instructions . Today, let's talk about , Comprehensively consider the principles for distinguishing the security objectives and implementation methods that cloud computing security expansion requires to focus on ?
Principle one : Only pay attention to the security protection of the cloud computing platform ( Such as the requirements of infrastructure location ), Or the security requirements related to the basic security services provided by the cloud computing platform to cloud service customers ( Such as the requirements for virtual network isolation of different cloud service customers ), Only applicable to cloud computing platforms .
Principle two : Pay attention to the cloud computing platform to provide cloud service customers and need customers “ Self operation ” Safety requirements related to safety services ( Such as the security clauses that ensure that the cloud service provider can audit the operations of cloud service customers ), It is also applicable to cloud computing platforms and cloud service customer business systems .
Principle three : Pay attention to the security requirements of the respective security protection requirements of the cloud computing platform and the cloud service customer business system ( Such as virtual network boundary access control requirements ), It is also applicable to cloud computing platforms and cloud service customer business systems .
Principle four : Only pay attention to the security requirements of cloud service customers ( Such as “ Cloud service providers choose ” Safety requirements in control points ), Only applicable to cloud service customer business system .
【 Knowledge development 】: Equal insurance 2.0 What are the security extension requirements of cloud computing ?
Cloud computing security extension requirements are additional security requirements that need to be implemented in addition to the general security requirements proposed for the cloud computing platform . The main contents include “ Location of infrastructure ”、“ Virtualization security ”、“ Mirror and snapshot protection ”、“ Cloud computing environment management ” and “ Cloud service providers choose ” etc. .
边栏推荐
- 学习突围2 - 关于高效学习的方法
- 事务的七种传播行为
- 测试下摘要
- Shortcut key of Bash
- Enterprise custom form engine solution (XII) -- experience code directory structure
- 【学习笔记】线段树选做
- Blog recommendation | Apache pulsar cross regional replication scheme selection practice
- PACP学习笔记一:使用 PCAP 编程
- MongoDB的导入导出、备份恢复总结
- Practical example of propeller easydl: automatic scratch recognition of industrial parts
猜你喜欢

Blog recommendation | Apache pulsar cross regional replication scheme selection practice

迅为iTOP-IMX6ULL开发板Pinctrl和GPIO子系统实验-修改设备树文件

Vscade editor esp32 header file wavy line does not jump completely solved

【学习笔记】AGC010

MySQL入门尝鲜

【学习笔记】zkw 线段树

AUTOCAD——大于180度的角度标注、CAD直径符号怎么输入?

Sed of three swordsmen in text processing

Isprs2021/ remote sensing image cloud detection: a geographic information driven method and a new large-scale remote sensing cloud / snow detection data set
![[learning notes] agc010](/img/2c/37f2537a4dadd84adacf3da5f1327a.png)
[learning notes] agc010
随机推荐
Introduce six open source protocols in detail (instructions for programmers)
JNA learning notes 1: Concepts
PHP calls the pure IP database to return the specific address
Sed of three swordsmen in text processing
php——laravel缓存cache
存储过程的介绍与基本使用
滑轨步进电机调试(全国海洋航行器大赛)(STM32主控)
test
Simple and easy-to-use code specification
HZOJ #235. Recursive implementation of exponential enumeration
[Presto profile series] timeline use
. Net ultimate productivity of efcore sub table sub database fully automated migration codefirst
How did Guotai Junan Securities open an account? Is it safe to open an account?
How to reset Firefox browser
Scrapy教程经典实战【新概念英语】
LIS 最长上升子序列问题(动态规划、贪心+二分)
人均瑞数系列,瑞数 4 代 JS 逆向分析
Isprs2021/ remote sensing image cloud detection: a geographic information driven method and a new large-scale remote sensing cloud / snow detection data set
Pcap learning notes II: pcap4j source code Notes
[untitled]