Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Cloud Security Guide V3.0 eBook

2025-03-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

With the efforts of major companies and various applications, all kinds of clouds come like clouds in the sky. Clouds bring performance improvement, resource utilization improvement, and greatly enrich people's lives. At the same time, they also bring security challenges. How public clouds secure themselves, how private clouds deliver services on the Internet, and how public and private clouds can be securely and efficiently integrated are some of the big questions ahead.

Here, I strongly recommend Cloud Security Guide v3.0, which is a professional organization focusing on cloud computing security, focusing on cloud security, including technology implementation and management governance.

Contents of Chinese version:

----------------------------------------------------

directory

Introduction............................................................................................. 1

Contents......................................................................................................................................................................................................................................................... 2

Preface........................................................................................................................................................................................................................................................ 3

V3.0 Chinese Version Translator's Preface................................................................................................................................................................................................................................... 4

English version thanks....................................................................................................................................................................................................................................................... 6

Editor's Note...................................................................................................................................................................................................................................................... 8

Editor's note on risk.................................................................................................................................................................................................................................................... 10

Part 1 Cloud Architecture

D1: Cloud computing architecture.................................................................................................................................................................................................................................................... 14

Part II Cloud Governance

D2: Governance and enterprise risk management.................................................................................................................................................................................................................................................. 31

D3: Legal issues: contracts and electronic discovery................................................................................................................................................................................................................................................ 36

D4: Compliance and Audit.................................................................................................................................................................................................................................................... 44

D5: Information Management and Data Security.................................................................................................................................................................................................................................................. 48

D6: Interoperability and portability.................................................................................................................................................................................................................................................. 61

Part 3: Cloud Operations

D7: Traditional Security, Business Continuity and Disaster Recovery............................................................................................................................................................................................................................................... 70

D8: Data Center Operation.................................................................................................................................................................................................................................................... 83

D9: Incident Response..................................................................................................................................................................................................................................................... 87

D10: Application safety.................................................................................................................................................................................................................................................... 96

D11: Encryption and Key Management.................................................................................................................................................................................................................................................. 119

D12: Identity, Authorization and Access Management..................................................................................................................................................................................................................................... 125

D13: Virtualization................................................................................................................................. 144

D14: SecaaS................................................................................................................................................................................................................................................... 149

----------------------------------------------------

English original download address:

http://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf

CSA official website:

http://www.cloudsecurityalliance.org

Attached is a download in Chinese. Thanks to the translator for bringing us such good information.

Attachment: http://www.example.com

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report