Infrastructure as a Service security 101: Public IaaS security issues

Infrastructure as a Service security 101: Public IaaS security issues

Date: Jan 21, 2013

This special presentation is part of's Enterprise Cloud Security School lesson, "Cloud security fundamentals for enterprises" featuring Rich Mogull of Securosis.

Assuming you have a grip on your organization’s security controls, how do you map cloud computing delivery models to those existing controls that protect physical assets, and also keep your organization compliant with regulations. 

This lesson will focus on public IaaS security issues, and more specifically will address a critical overarching concern for security professionals when considering a cloud provider: how to determine whether a cloud provider can enable an enterprise's security strategy.

About the speaker:
Rich Mogull is the founder and analyst of information security research and advisory firm Securosis. He has more than 20 years experience in information security, physical security, and risk management. He specializes in data security, application security, emerging security technologies, and security management. Prior to founding Securosis, Rich was a Research Vice President at Gartner on the security team where he also served as research co-chair for the Gartner Security Summit. Prior to his seven years at Gartner, Rich worked as an independent consultant, Web application developer, software development manager at the University of Colorado, and systems and network administrator.

Editor's note: This presentation was originally recorded in March, 2012.

More on Public Cloud Computing Security

  • canderson

    On cloud security requirements, customers must assume responsibility

    VIDEO - Video: Gartner's Jay Heiser says recent attacks on cloud providers show enterprises and business units must manage cloud security requirements.
  • canderson

    Cloud security basics: What enterprises, IT pros need to know

    VIDEO - Video: Securosis CEO Rich Mogull details cloud security basics, including how the cloud affects enterprises today and the joys of security automation.
  • canderson

    Public cloud encryption: Encrypted cloud storage options for enterprises

    VIDEO - Rich Mogull describes how public cloud encryption offers additional control in multi-tenancy environments, and demos how to ensure proper encrypted cloud storage.
  • AWS CloudTrail

    Definition - AWS CloudTrail is an application program interface (API) call-recording and log-monitoring Web service offered by Amazon Web Services (AWS).
  • multi-tenancy

    Definition - Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers. Each customer is called a tenant. Tenants may be given the ability to customize some parts of the application, such as color of the user interface (UI) or business rules, but they cannot customize the application's code.
  • Amazon Elastic Block Storage encryption explained

    Tip - Amazon EBS encryption is now offered by AWS. Expert Dave Shackleford explains how it works, why companies might struggle with it and whether it brings the industry one step closer to default cloud data encryption.
  • Understanding the risks of cloud computing

    Tip - Understanding the risks of cloud computing is key to protecting a cloud-centric enterprise. Ravila Helen White explains the three must-know dimensions of cloud risk.
  • An introduction to Microsoft Office 365 security

    Tip - The Microsoft Office 365 security features are robust, but may not offer the granularity some enterprises need. Expert Dave Shackleford reviews the security pros and cons of Microsoft's cloud-based productivity suite.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: