Every time you access your email, join a video conference call or back up the photos on your smartphone, you rely on cloud computing. Cloud computing services process information on data servers located across the globe, which are colloquially known as “the cloud.” The cloud delivers computing resources over the Internet, such as storage, software, and services, creating a complex supply chain requiring extensive security protocols. Before deciding whether your business should migrate to the cloud, you should understand cloud computing’s capabilities and security risks.
This course covers cloud security risks and threats, basic operations, and incident response considerations, along with application, data, and infrastructure security concepts.
More Cloud Security Resources
Below are some additional resources that may be useful to those considering migration to the cloud:
In this report, you will find a concise explanation of cloud security and risk management.
This lecture provides an overview of cloud computing, including concepts and best practices for cloud architecture, design, security, and operation.
To ensure the safety of your business and your customers' information, the FTC has provided six helpful tips for businesses to follow when using cloud services.
This document divides cloud vulnerabilities into four classes (misconfiguration, poor access control, shared tenancy vulnerabilities, and supply chain vulnerabilities) that encompass the vast majority of known vulnerabilities.
This publication provides an overview of the security and privacy challenges pertinent to public cloud computing. While the document is written with Federal agencies in mind, it also highlights considerations all organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment.