Securing Cloud Platforms to Host Critical Workloads
As organizations prepare to move critical workloads to the cloud, more stringent security and compliance requirements emerge. This report examines the strengths and shortcomings of existing cloud platform security technologies, and defines an approach to overcome these limitations and leverage existing technology to secure the virtual infrastructure and enable compliance.
Learn how to implement:
- User and resource-based access controls;
- Audit quality logs linked to individual users;
- Virtual resource isolation in multi-tenant clouds;
- Virtual infrastructure hardening.