Identification and data protection in cloud computing
Source: Internet
Author: User
KeywordsCloud computing data protection
The
Rsa,emc (NYSE:EMC) Information Security division recently released a new rsa® security profile entitled "Identification and data protection in cloud computing: Best Practices for building a trusted environment." This overview provides guidance and the best possible solution for organizations that need to address identity authentication and data security challenges in cloud computing. The RSA security profile for this issue brings together top technical experts in cloud computing security to help organizations understand how to build a trusted environment for cloud services, how to defend against network fraud, and how to respond to the challenges of new compliance in a cloud environment. The RSA Security Essentials Author is the industry's most renowned security and virtualization expert from EMC and VMware, including RSA, Chief Technology officer, EMC Information Security Division, Chief technical Officer and senior Vice President, Bret Hartman,vmware Research and Development Center, Stephen Dr. Herrod and other EMC senior technical experts. In the security essentials for this issue, the authors agree that the security of cloud computing has tremendous potential to grow beyond the level of current information security. In a cloud computing environment, security protocols can be built on the virtualization layer, not just in the common application tier. By embedding security policies at the technical level into the virtualized infrastructure of the cloud environment, organizations can have stronger, smarter security solutions to protect their users and data. Building relationships in cloud environments: deciding who to trust RSA Security Overview The data protection and user authentication technologies, services, methodologies, and a considerable number of practical applications that are needed in cloud computing are already present in the enterprise architecture, and need to be extended more strategically to the cloud architecture. The main reason for blocking cloud computing as a mainstream service platform is the lack of trust, especially between the owners of cloud computing resources, the providers and the companies that hire the service. The authors provide organizations with a trusted environment for improving cloud computing by permitting viable cloud computing performance and security standards. The overview also lists the best practices for managing a trusted environment for private clouds. Fraud protection: the development of preventing bad people from invading cloud computing is accompanied by the emergence of "black Cloud", which is driven by fraud. Potential cyber frauds are the main stumbling-by for businesses and their users to use cloud services. Businesses need to expand their strong identity and fraud-recognition capabilities against unauthorized access, phishing, malware, and even intellectual property theft. The RSA Security Overview provides specific advice on how to better implement multi-level, risk-based identity authentication services, and the protection of increasingly complex network fraud attacks. Data compliance Management in cloud computing provides virtually all the visibility of the activities associated with application services at the virtual layer, one of the significant advantages of cloud computing. The highly granular monitoring capabilities of the virtual layer can greatly improve the reporting process for auditing and compliance in cloud computing. But the cloud computing environment does pose some new challenges to compliance. Lack of physical boundaries in cloud computingThe lack of compliance with privacy legislation, which involves specific competencies, has become rather difficult. RSA Information Security reports provide specific recommendations for improving compliance, such as importing cloud-computing vendor logs to security information systems, event management systems, and deploying "data-aware" cloud storage platforms to intelligently allocate data based on policy and regulatory requirements. Data and Identity Protection Practitioner's Guide in cloud computing RSA's new security report concludes with technology solutions and services that can help security workers better protect data and user identities in cloud computing. These programs and services revolve around data center monitoring and multiple leases, data encryption and password randomization, Federated Identity Management, strong risk-based authentication, fraud prevention and malware detection, project management and auditing of cloud computing, data loss protection, and compliance. In the face of today's most pressing information security risks and opportunities, the RSA Security Essentials is designed to provide substantive advice to security managers. Each security profile is customized by a select group of expert responders who mobilize organizations to share expertise on a major new subject. The RSA Security Overview provides a panoramic insight, as well as practical technical advice, and is an important reading for today's leading security practitioners. Today, RSA's second security profile, "Identification and data protection in cloud computing: Best Practices for building a trusted environment", is now available for download from www.rsa.com.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.