INTRODUCTION

Part 2 is the meat of this book, providing pragmatic advice on deploying Cloud services in a risk-managed fashion.

This book uses security architecture techniques to drive a consistent, cohesive and comprehensive approach to securing Cloud services. Part 2, therefore, begins with an overview of the security architecture processes that can be used to derive the necessary security controls associated with a proposed Cloud deployment. I then introduce a Security Reference Model (SRM) which provides the basis for discussion of the delivery of security controls across the different Cloud service models.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.216.34.146