From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Secure infrastructure operations

Secure infrastructure operations

From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review

Start my 1-month free trial

Secure infrastructure operations

- [Instructor] Once we have a cloud data center in place, we need to adopt security controls that allow us to securely operate that physical infrastructure. Now, the first thing we should think about is local access to systems. Large data centers have thousands of servers in them, so we can't connect keyboards and monitors to every single one. Instead, we use keyboard, video and mouse, or KVM systems to share one keyboard, monitor and mouse with many different systems. In addition to this local physical access, we also may need to access system remotely and there are a few remote access technologies at our disposal. First, KVM systems may offer remote access, allowing us to use the same KVM system from afar that we would use if we were physically present in the data center. Second, for Windows servers, we can use the Remote Desktop Protocol, or RDP, to provide graphical access to the familiar Windows server interface.…

Contents