Information Security in the Clouds

By Donald Faatz , Lawrence Pizette

Deploying data and applications to a cloud computing environment, whether private, community, or public, changes an organization's information technology (IT) security posture.

Download Resources


PDF Accessibility

One or more of the PDF files on this page fall under E202.2 Legacy Exceptions and may not be completely accessible. You may request an accessible version of a PDF using the form on the Contact Us page.

Deploying data and applications to a cloud computing environment, whether private, community, or public, changes an organization's information technology (IT) security posture. Private cloud environments utilize new software layers, such as virtualization technologies, within the IT infrastructure. While community and public offerings may employ similar technologies, the security implications of community and public clouds are more complex. Use of these offerings changes the risk profile because some security responsibility is transferred to the cloud provider, and the organization's security perimeter is extended to include the provider's computing resources and personnel. Given these changes, organizations need to understand the risks and appropriate mitigations.