Abstract
Today's organisations are increasingly turning to cloud computing providers to offer them the scalability and IT agility necessary to fuel a fast-moving digital and app-based business. In reality, this means operating complex hybrid IT environments featuring public cloud Infrastructure as a Service (IaaS) platforms from providers such as Amazon Web Services (AWS). Yet the notion of shared responsibility is still misunderstood by some, leading to potentially fatal cyber-security gaps. To help ensure maximum protection for your data, systems and users, you need to take an identity-centric, ‘zero trust’ approach. Today's organisations are increasingly turning to cloud computing providers to offer them the scalability and IT agility necessary to fuel a fast-moving digital and app-based business. In reality, this means operating complex hybrid IT environments featuring public cloud infrastructure as a service (IaaS) platforms. Yet the notion of shared responsibility is still misunderstood by some, leading to potentially fatal cyber-security gaps. To help ensure maximum protection for your data, systems and users, you need to take an identity-centric, ‘zero trust’ approach, argues Barry Scott of Centrify.
Subject
Information Systems and Management,Computer Networks and Communications,Safety, Risk, Reliability and Quality
Reference6 articles.
1. ‘Steps to Secure Your Journey to the Public Cloud’; Barracuda. Accessed Mar 2018. http://content.barracuda.com/discover-your-cloud
2. ‘Shared Responsibility Model’; Amazon. Accessed February 2018. https://aws.amazon.com/compliance/shared-responsibility-model/
3. ‘Data Breach Investigations Report 2017’; Verizon. Accessed Mar 2018. www.verizonenterprise.com/verizon-insights-lab/dbir/2017/
4. Eric Newcomer ‘Uber Paid Hackers to Delete Stolen Data on 57 Million People’;
21 Nov 2017:
Bloomberg>
Accessed 1 February 2018. www.bloomberg.com/news/articles/2017-11-21/uber-concealed-cyber-attack-that-exposed-57-million-people-s-data
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Security Management Mode of Electrical Power System Through Zero Web of Trust System;Smart Innovation, Systems and Technologies;2024
2. Zero Trust Awareness: Creating a Culture Aware of Security;SpringerBriefs in Applied Sciences and Technology;2024
3. Applications & Case Studies of Successful Zero Trust;SpringerBriefs in Applied Sciences and Technology;2024
4. Construction of new power system security protection system combined with zero trust network;Third International Conference on Electronics, Electrical and Information Engineering (ICEEIE 2023);2023-10-27
5. Zero-Trust for the System Design Lifecycle;Journal of Computing and Information Science in Engineering;2023-06-09