What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close


Four steps to improving your security in the cloud

Oct 24, 2012

This whitepaper explores the effects of cloud computing on enterprise security and the associated opportunities and challenges. We will take a comprehensive look at the importance of security in cloud and discuss how you can use the technology you already have — such as SELinux and sVirt — to improve your security in the cloud.

We will focus on how to use your existing technology, what things you should consider in a provider, how you can increase your cloud skill set using the expertise Red Hat offers, and why consideration of three primary components (governance, risk, and control) are crucial to your success.

We propose that cloud computing security must be engineered into the cloud design, rather than added as a retrofitted control or a paper-based exercise at the point of audit. CIOs must ensure that a move to the cloud is not accompanied by an out-of-sight, out-of-mind approach to security. Practical advice is offered, and we address future trends in certification, compliance,and auditing.