Abstract : In this section of "Mastering Cloud Security: Techniques and Best Practices," we examine the crucial facets of cloud security. The phrase "cloud security" refers to a broad range of practices and equipment used to safeguard hardware, software, and data in cloud environments. The chapter emphasizes the significance of protecting confidential data and guaranteeing the accessibility and reliability of cloud-based resources. It highlights the fundamental principles of cloud security, including data encryption, access management, constant monitoring, and compliance observance. The shared responsibility concept is investigated, illuminating the interaction between cloud service providers and clients. The need for proactive and all-encompassing security policies is underlined by a close examination of security issues in the cloud. The importance of identity and access management (IAM) as a key component of cloud security, including authentication, authorization, and the principle of least privilege, is also emphasized in this chapter. Finally, it discusses data encryption and compliance, providing information on data security and regulatory compliance in the context of cloud security.
Keywords : Cloud Security
Cite :
References :
Ul Haq, M. N., & Kumar, N. (2021). A novel data classification-based scheme for cloud data security using various cryptographic algorithms. International Review of Applied Sciences and Engineering.
Sedano, W. K., & Salman, M. (2021, July). Auditing Linux Operating System with Center for Internet Security (CIS) Standard. In 2021 International Conference on Information Technology (ICIT) (pp. 466-471). IEEE.
National Institute of Standards and Technology (NIST). (2019). NIST Special Publication 800-144 Revision 2. Guidelines on Security and Privacy in Public Cloud Computing. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-144r2.pdf