Infrastructure as a Service security 101: Public IaaS security issues

Infrastructure as a Service security 101: Public IaaS security issues

Date: Jan 21, 2013

This special presentation is part of's Enterprise Cloud Security School lesson, "Cloud security fundamentals for enterprises" featuring Rich Mogull of Securosis.

Assuming you have a grip on your organization’s security controls, how do you map cloud computing delivery models to those existing controls that protect physical assets, and also keep your organization compliant with regulations. 

This lesson will focus on public IaaS security issues, and more specifically will address a critical overarching concern for security professionals when considering a cloud provider: how to determine whether a cloud provider can enable an enterprise's security strategy.

About the speaker:
Rich Mogull is the founder and analyst of information security research and advisory firm Securosis. He has more than 20 years experience in information security, physical security, and risk management. He specializes in data security, application security, emerging security technologies, and security management. Prior to founding Securosis, Rich was a Research Vice President at Gartner on the security team where he also served as research co-chair for the Gartner Security Summit. Prior to his seven years at Gartner, Rich worked as an independent consultant, Web application developer, software development manager at the University of Colorado, and systems and network administrator.

Editor's note: This presentation was originally recorded in March, 2012.

More on Public Cloud Computing Security

  • canderson

    On cloud security requirements, customers must assume responsibility

    VIDEO - Video: Gartner's Jay Heiser says recent attacks on cloud providers show enterprises and business units must manage cloud security requirements.
  • canderson

    Cloud security basics: What enterprises, IT pros need to know

    VIDEO - Video: Securosis CEO Rich Mogull details cloud security basics, including how the cloud affects enterprises today and the joys of security automation.
  • canderson

    Public cloud encryption: Encrypted cloud storage options for enterprises

    VIDEO - Rich Mogull describes how public cloud encryption offers additional control in multi-tenancy environments, and demos how to ensure proper encrypted cloud storage.
  • Apple iCloud hit with MitM attacks in China

    News - There is more potential trouble for Apple iCloud users as a nationwide man-in-the-middle attack struck the iCloud website in China amid the country's launch of the new iPhone 6.

    ( Oct 20, 2014 )

  • How calculating cloud resiliency cuts cloud downtime

    Tip - Calculating and monitoring cloud resiliency is critical to preventing cloud downtime or lessening its effects. Expert Ed Moyle discusses the two main steps to start reducing cloud concerns.
  • Helix Nebula cloud security hinges on federated identity management

    News - CERN and the Cloud Security Alliance explain how federated identity management protects Helix Nebula, a European cloud platform that's running applications for such research projects as the Large Hadron Collider.

    ( Sep 02, 2014 )

  • AWS CloudTrail

    Definition - AWS CloudTrail is an application program interface (API) call-recording and log-monitoring Web service offered by Amazon Web Services (AWS).
  • multi-tenancy

    Definition - Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers. Each customer is called a tenant. Tenants may be given the ability to customize some parts of the application, such as color of the user interface (UI) or business rules, but they cannot customize the application's code.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: