Virtualization Security in Cloud Computing

Bringing VMs (virtual machines) onto the cloud has become increasingly popular. Recent years have seen great advancements in both cloud computing and virtualization. On one hand there is the ability to pool various resources to provide software-as-a-service, infrastructure-as-a-service and platform-as-a-service. At its most basic, this is what describes cloud computing. …

Cloud Survey Find Need for Better Security and Performance Monitoring

AccelOps announced findings from its recent survey of 176 IT security professionals conducted online and at the RSA Conference 2013. While 65 percent of respondents’ organizations are using cloud services today, only 46 percent have moved mission-critical applications and data outside the enterprise. Significant inhibitors remain in ensuring effective cloud …

Distributed Access Control Architecture for Cloud Computing

Cloud computing has specific security challenges as multi-tenancy and virtualization fea­tures create risks due to sharing of physical resources among potential untrusted tenant. Het­erogeneity of services also requires different degrees of granularity in access control mechanisms. This article discusses a distributed architecture based on principles from security management and software …

Single Sign-on in the Cloud

Single sign-on (SSO) allows companies to enforce access control policies across multiple applications in a consistent manner. In this article, Kunal Mittal discusses core concepts of how single sign-on can be extended from your enterprise to the cloud. Multiple mechanisms can be used to achieve SSO between traditional applications running …

Crafting a Vulnerability Mitigation Policy for SaaS-oriented Web Application

When deadlines loom, you sacrifice security features in order to move the application more quickly into production. This reaction often results in a substandard application. A more proactive solution is to establish a Software as a Service (SaaS)-oriented web application vulnerability mitigation policy that anticipates application trouble spots and contains …

Clobbering the Cloud

Cloud Computing dominates the headlines these days but like most paradigm changes this introduces new risks and new opportunities for us to consider. Some deep technical research has gone into the underlying technologies (like Virtualization) but to some extent this serves only to muddy the waters when considering the overall …

Cloud Security Architecture from a Cloud Consumer’s Perspective

Developers have developed applications for IaaS (Amazon AWS, Rackspace, etc) and PaaS (Azure, Google App Engine, Cloud Foundry) Cloud platforms. These platforms provide basic security features including support for authentication, DoS attack mitigation, firewall policy management, logging, basic user and profile management but security concerns continue to be the number …