In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
With the efforts of major companies and various applications, all kinds of clouds come like clouds in the sky. Clouds bring performance improvement, resource utilization improvement, and greatly enrich people's lives. At the same time, they also bring security challenges. How public clouds secure themselves, how private clouds deliver services on the Internet, and how public and private clouds can be securely and efficiently integrated are some of the big questions ahead.
Here, I strongly recommend Cloud Security Guide v3.0, which is a professional organization focusing on cloud computing security, focusing on cloud security, including technology implementation and management governance.
Contents of Chinese version:
----------------------------------------------------
directory
Introduction............................................................................................. 1
Contents......................................................................................................................................................................................................................................................... 2
Preface........................................................................................................................................................................................................................................................ 3
V3.0 Chinese Version Translator's Preface................................................................................................................................................................................................................................... 4
English version thanks....................................................................................................................................................................................................................................................... 6
Editor's Note...................................................................................................................................................................................................................................................... 8
Editor's note on risk.................................................................................................................................................................................................................................................... 10
Part 1 Cloud Architecture
D1: Cloud computing architecture.................................................................................................................................................................................................................................................... 14
Part II Cloud Governance
D2: Governance and enterprise risk management.................................................................................................................................................................................................................................................. 31
D3: Legal issues: contracts and electronic discovery................................................................................................................................................................................................................................................ 36
D4: Compliance and Audit.................................................................................................................................................................................................................................................... 44
D5: Information Management and Data Security.................................................................................................................................................................................................................................................. 48
D6: Interoperability and portability.................................................................................................................................................................................................................................................. 61
Part 3: Cloud Operations
D7: Traditional Security, Business Continuity and Disaster Recovery............................................................................................................................................................................................................................................... 70
D8: Data Center Operation.................................................................................................................................................................................................................................................... 83
D9: Incident Response..................................................................................................................................................................................................................................................... 87
D10: Application safety.................................................................................................................................................................................................................................................... 96
D11: Encryption and Key Management.................................................................................................................................................................................................................................................. 119
D12: Identity, Authorization and Access Management..................................................................................................................................................................................................................................... 125
D13: Virtualization................................................................................................................................. 144
D14: SecaaS................................................................................................................................................................................................................................................... 149
----------------------------------------------------
English original download address:
http://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf
CSA official website:
http://www.cloudsecurityalliance.org
Attached is a download in Chinese. Thanks to the translator for bringing us such good information.
Attachment: http://www.example.com
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.