当前位置:网站首页>[etc.] what are the security objectives and implementation methods that cloud computing security expansion requires to focus on?
[etc.] what are the security objectives and implementation methods that cloud computing security expansion requires to focus on?
2022-07-07 13:13:00 【Xingyun housekeeper】
Equal insurance 2.0 In policy , Cloud computing security extension requirements are additional security requirements that need to be implemented in addition to the general security requirements proposed for the cloud computing platform . But in practice , It usually needs to be identified in the operation instructions . Today, let's talk about , Comprehensively consider the principles for distinguishing the security objectives and implementation methods that cloud computing security expansion requires to focus on ?
Principle one : Only pay attention to the security protection of the cloud computing platform ( Such as the requirements of infrastructure location ), Or the security requirements related to the basic security services provided by the cloud computing platform to cloud service customers ( Such as the requirements for virtual network isolation of different cloud service customers ), Only applicable to cloud computing platforms .
Principle two : Pay attention to the cloud computing platform to provide cloud service customers and need customers “ Self operation ” Safety requirements related to safety services ( Such as the security clauses that ensure that the cloud service provider can audit the operations of cloud service customers ), It is also applicable to cloud computing platforms and cloud service customer business systems .
Principle three : Pay attention to the security requirements of the respective security protection requirements of the cloud computing platform and the cloud service customer business system ( Such as virtual network boundary access control requirements ), It is also applicable to cloud computing platforms and cloud service customer business systems .
Principle four : Only pay attention to the security requirements of cloud service customers ( Such as “ Cloud service providers choose ” Safety requirements in control points ), Only applicable to cloud service customer business system .
【 Knowledge development 】: Equal insurance 2.0 What are the security extension requirements of cloud computing ?
Cloud computing security extension requirements are additional security requirements that need to be implemented in addition to the general security requirements proposed for the cloud computing platform . The main contents include “ Location of infrastructure ”、“ Virtualization security ”、“ Mirror and snapshot protection ”、“ Cloud computing environment management ” and “ Cloud service providers choose ” etc. .
边栏推荐
- 国泰君安证券开户怎么开的?开户安全吗?
- MongoDB复制(副本集)总结
- MongoDB优化的几点原则
- JS缓动动画原理教学(超细节)
- Blog recommendation | Apache pulsar cross regional replication scheme selection practice
- How to make the new window opened by electorn on the window taskbar
- MongoDB 遇见 spark(进行整合)
- [untitled]
- Isprs2021/ remote sensing image cloud detection: a geographic information driven method and a new large-scale remote sensing cloud / snow detection data set
- shell 批量文件名(不含扩展名)小写改大写
猜你喜欢
About how appium closes apps (resolved)
ESP32 ① 编译环境
PAcP learning note 1: programming with pcap
About the problem of APP flash back after appium starts the app - (solved)
Vscade editor esp32 header file wavy line does not jump completely solved
MySQL入门尝鲜
Adopt a cow to sprint A shares: it plans to raise 1.85 billion yuan, and Xu Xiaobo holds nearly 40%
Storage principle inside mongodb
Ogre入门尝鲜
滑轨步进电机调试(全国海洋航行器大赛)(STM32主控)
随机推荐
Enterprise custom form engine solution (XII) -- experience code directory structure
MongoDB 分片总结
[learning notes] segment tree selection
shell 批量文件名(不含扩展名)小写改大写
Simple and easy-to-use code specification
Cookie and session comparison
Initialization script
[untitled]
Mongodb replication (replica set) summary
Practical case: using MYCAT to realize read-write separation of MySQL
MATLAB中polarscatter函数使用
PCAP学习笔记二:pcap4j源码笔记
解决缓存击穿问题
【无标题】
- Oui. Migration entièrement automatisée de la Sous - base de données des tableaux d'effets sous net
ESP32系列专栏
RealBasicVSR测试图片、视频
事务的七种传播行为
Cloud detection 2020: self attention generation countermeasure network for cloud detection in high-resolution remote sensing images
记一次 .NET 某新能源系统 线程疯涨 分析