I have a post on Intel's Cloud Access Security blog on Understanding Cloud Security Standards, this is part 1 of a series. Before diving into the standards and patters, I discuss four Anti-Patterns that have emerged in Cloud Security:
- Low/no access control
- Replicating user accounts
- Copying credentials
- “Trusted” proxy
These examples of Anti-Patterns, i.e. things to avoid are discussed further in the blog, and we'll look at how remedy these in your Cloud Security Architecture read it here.
Comments