Cloud Computing Implementation Management and Security phần 7

Sử dụng ứng dụng ảo hóa cho phép các ứng dụng chạy trong môi trường nonnative. Ví dụ, Wine cho phép người sử dụng Linux để chạy các ứng dụng Microsoft Windows từ nền tảng Linux. Ảo hóa cũng giúp bảo vệ các hoạt độn Tiếp theo bạn cần phải kích hoạt phát thanh truyền hình từ máy chủ của bạn bằng cách xác định địa chỉ quảng bá mạng cho mạng cục bộ các chỉ | 166 Cloud Computing as-needed basis. More detailed and technical security risk assessments in the form of threat modeling should also be applied to applications and infrastructure. Doing so can help the product management and engineering groups to be more proactive in designing and testing the security of applications and systems and to collaborate more closely with the internal security team. Threat modeling requires both IT and business process knowledge as well as technical knowledge of how the applications or systems under review work. Security Portfolio Management Given the fast pace and collaborative nature of cloud computing security portfolio management is a fundamental component of ensuring efficient and effective operation of any information security program and organization. Lack of portfolio and project management discipline can lead to projects never being completed or never realizing their expected return unsustainable and unrealistic workloads and expectations because projects are not prioritized according to strategy goals and resource capacity and degradation of the system or processes due to the lack of supporting maintenance and sustaining organization planning. For every new project that a security team undertakes the team should ensure that a project plan and project manager with appropriate training and experience is in place so that the project can be seen through to completion. Portfolio and project management capabilities can be enhanced by developing methodology tools and processes to support the expected complexity of projects that include both traditional business practices and cloud computing practices. Security Awareness People will remain the weakest link for security. Knowledge and culture are among the few effective tools to manage risks related to people. Not providing proper awareness and training to the people who may need them can expose the company to a variety of security risks for which people rather than system .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
5    268    1    02-06-2024
11    68    1    02-06-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.