The log should show what type security problem a cloud service type had and when and how the problem was fixed.
日志应该显示一个云服务类型拥有何种类型的安全问题,以及该问题是在何时和如何修复的。
Cloud service security can be threatened by poor credentials, protocol exposure, and implementation flaws in remote management.
远程管理中的劣质凭证、协议暴露和实现缺陷都可能会威胁云服务安全性。
Security already implemented by cloud providers is one more available service that customers can configure to satisfy the their enhanced security policies.
已经由云提供者实现的安全性是另一个可用服务,客户可配置该服务来满足其增强的安全策略。
A carefully crafted security policy Outlines what cloud computing service consumers and providers should do; it can save providers many hours of management time if they develop a security policy.
精心制定的安全策略应该描述云计算服务的使用者和提供者应该做什么;它可以让提供者减少很多管理时间。
Cloud service consumer. Again, we include the cloud service customer in the reference architecture because it's relevant to an all-encompassing security treatment.
云服务的消费者:同样,我们之所以把云服务的客户包括到架构中是因为它对于全面的安全性讨论很重要。
This article briefly covers important aspects of cloud service security issues and then describes the mitigating risks that are part of a risk assessment program.
本文简要讨论云服务安全问题的重要方面,然后描述风险评估和降低风险的步骤。
The providers should encourage consumers to send security questions that might need to be resolved or require negotiation before the consumer rents or subscribes to a cloud service type.
提供商应该鼓励使用者提出问题,在使用者租用或预订云服务类型之前,可能需要解决这些问题或就这些问题进行协商。
It has been running the Ubuntu Enterprise Cloud service for too long now and offers security as well as a cost effective solution.
很早之前它已经运行了Ubuntu企业云服务,并提供安全性以及成本效益的解决方案。
Cloud service security can be threatened by.
云服务安全性会受到以下方面的威胁。
Arce: do you think these different frameworks have, if you will, a too-narrow view of technologies ap-plied to security, things that do not really apply well to cloud service providers?
Arce:你是否会觉得这么多不同的安全框架(如果让你们去使用的话)的技术视角是否显得太狭窄了呢?它们是不是不能被云服务提供商很好地应用呢?
Within its boundaries, specify which cloud service type the provider hosts and the consumers rents and subscribe, what threshold policies are applied, and how the security policy is applied.
在安全策略边界内,指定由提供商托管并由使用者租用和预订的云服务类型、应用的阈值策略以及应用安全策略的方式。
CloudFlare makes a cloud-based software program that purportedly helps protect websites from security violations such as malware and denial of service attacks.
CloudFlare开发了一款云端软件程序,可以帮助网站免受恶意软件和DoS攻击的威胁。
Now many cloud-based vendors are doing a better job of security than most ordinary companies can do in-house, as the cloud providers are held to such strict service-level agreements.
而现在许多云服务供应商严格遵守服务等级协议,他们的安全措施已经要比许多普通公司要好得多了。
Organizations that outsource services to cloud service providers have a number of concerns about the security of their data and information.
使用云服务外包业务的组织往往对其数据和信息的安全有很多担忧。
Organizations that outsource services to cloud service providers have a number of concerns about the security of their data and information.
使用云服务外包业务的组织往往对其数据和信息的安全有很多担忧。
应用推荐