ABSTRACT

Organizations must consider protection and detection mechanisms in each area, while continually increasing their level of maturity, ultimately driving a business-aligned security strategy. If an organization has not performed its due diligence in putting the necessary controls in place before the security incident occurs, all traces of the breach are overwritten or deleted by the time it’s investigated. Vulnerability scanners are often the answer to help inspect and identify security risks and vulnerabilities when deploying systems in the cloud. Server, network, storage, and application virtualization are the core components that most cloud providers specialize in delivering. These different computing resources make up the bulk of the infrastructure in most organizations. Security center leverages many of the next-generation technologies that are driving the newest developments in security, such as behavior analytics and machine learning. This chapter reviews basic and advanced public cloud security architectures analyzing their design characteristics and unique environmental requirements.