Cloud Security Guidance IBM Recommendations for the Implementation of Cloud Security

An IBM Redpaper publication


Abstract

Cloud computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all processes, applications, and services provisioned "on demand", regardless of user location or device. As a result, cloud computing gives organizations the opportunity to increase their service delivery efficiencies, streamline IT management, and better align IT services with dynamic business requirements. In many ways, cloud computing offers the "best of both worlds", providing solid support for core business functions along with the capacity to develop new and innovative services.

In addition to the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. The "externalized" aspect of outsourcing makes it harder to maintain data integrity and privacy, support data and service availability, and demonstrate compliance.

The security measures discussed in this IBM Redpapers™ publication represent best practice implementations for cloud security.

Table of contents

Introduction to cloud computing
Cloud security: the grand challenge
Evaluate different models of cloud computing
Examine the IBM Security Framework
Guide to implementing a secure cloud
Summary



Profile

Publish Date
30 October 2009

Last Update
02 November 2009


Rating:
(based on 7 reviews)


Author(s)

IBM Form Number
REDP-4614-00

Number of pages
22