Welcome to the Cloud Security Resource Area. My name is Eyal Estrin and I am a cloud architect in the
Cloud security is a hot topic worldwide due to both regulation and demand from institutions. Migrating workloads to the cloud
Our next installment in the alphabet soup of internet security is AAA, or Authentication, Authorization & Accounting. AAA is a
One of the important tools at our disposal for ensuring that confidentiality of data can be maintained is Encryption. This
A fundamental security principle in Cloud Computing is the concept of the Shared Responsibility model. This concept defines the responsibilities
Institutions engaging with public cloud service providers need assurance that they can trust that provider with their data. One of
This post addresses another important aspect of cloud security – the network, both within the Cloud Service Provider and the
This document addresses another important aspect of cloud security – the network. As network security is specific to each cloud
This document addresses another important aspect of cloud security – the network. As network security is specific to each cloud
This document addresses another important aspect of cloud security - Identity Management. As the concepts and terms might be different
This document addresses another important aspect of cloud security - Identity Management. While the concepts are common, the implementation approach
This document addresses another important aspect of cloud security - Identity Management. As the concepts and terms might be different
Working with public cloud providers raises many security challenges for customers, due to the fact that they do not control
The goal of this post is to present a common case study for building a research environment in AWS. Building
The goal of this post is to present a common case study for building a research environment in Azure. Building
The goal of this post is to present a common case study for building a research environment in Google Cloud
In a previous post we explained the basic concepts of encryption. In this chapter we will focus on the various solutions
In the past couple of years, a new range of solutions and technologies known as Cloud Access Security Brokers (CASB)
Working with cloud environments may certain security threats to an organization. In this post, we will review the most common
Working with public cloud services, increases the attack surface, and requires us to adapt our security controls and policies. Public
As part of managing the risk of working with public clouds, we need to conduct on-going tests in-order to measure
As part of managing the risk in working with public clouds, we need to configure an ongoing monitoring solution for
Academia remains cautious about security in adopting cloud computing models. Putting data on someone's public storage or running software on

 

To receive regular news about GÉANT Cloud Services and other resources , sign up for our regular newsletter