We are sorry, This PDF is available in download format only

Planning Guide: Cloud Security

This cloud security checklist and guide provide practical information to help you integrate security planning into your cloud computing initiatives—from data center to endpoint devices—including:

• Explains security vulnerabilities specific to cloud environments
• Makes suggestions and recommendations for strengthening data and platform protection in cloud implementations
• Provides guidance on using cryptography technologies such as encryption to protect data
• Describes the importance of a trusted foundation to secure platform and infrastructure for client, edge, and data center systems, including hardware-based technologies and API gateways
• Explains how to extend trust across federated clouds by using trusted compute pools to build higher assurance into compliance and to streamline audit processes
• Provides a cloud security checklist for making sure security is part of your evaluation of cloud service providers

This cloud security checklist and guide provide practical information to help you integrate security planning into your cloud computing initiatives—from data center to endpoint devices—including:

• Explains security vulnerabilities specific to cloud environments
• Makes suggestions and recommendations for strengthening data and platform protection in cloud implementations
• Provides guidance on using cryptography technologies such as encryption to protect data
• Describes the importance of a trusted foundation to secure platform and infrastructure for client, edge, and data center systems, including hardware-based technologies and API gateways
• Explains how to extend trust across federated clouds by using trusted compute pools to build higher assurance into compliance and to streamline audit processes
• Provides a cloud security checklist for making sure security is part of your evaluation of cloud service providers

Related Videos