From the course: Requirement-Driven Cloud Selection and Deployment

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Security

Security

From the course: Requirement-Driven Cloud Selection and Deployment

Start my 1-month free trial

Security

- [Instructor] Much like governance, security in many instances is an afterthought. However, it should be systemic to everything you do, including systemic to understanding to your requirements. It basically affects all parts of a cloud computing system. So, when we deal with security, we have a few things that we have to check off. Number one, how we're going to implement identity and access management. So keep in mind that most clouds are complex distributed systems and that identity access management, as a solution pattern and a type of security technology, really comes to bear. So you have to pick which one you're going to leverage. You have to pick the approach. You have to pick what directory services are going to be implemented. Typically, we have to deal with encryption. Sometimes we encrypt everything, both at rest, in other words how it's stored on the target cloud platform, or in flight as it moves through…

Contents