Home
Banner Details

Securing the Cloud: Cloud Security Techniques


Cloud security architecture is effective only if the correct defensive implementations are in place. An efficient cloud security architecture should recognize the issues that will arise with security management. The security management addresses these issues with security controls. These controls are put in place to safeguard any weaknesses in the system and reduce the effect of an attack. While there are many types of controls behind a cloud security architecture, they can usually be found in one of the following categories:

Deterrent controls
These controls are intended to reduce attacks on a cloud system. Much like a warning sign on a fence or a property, deterrent controls typically reduce the threat level by informing potential attackers that there will be adverse consequences for them if they proceed. [Some consider them a subset of preventive controls.]
Preventive controls
Preventive controls strengthen the system against incidents, generally by reducing if not actually eliminating vulnerabilities. Strong authentication of cloud users, for instance, makes it less likely that unauthorized users can access cloud systems, and more likely that cloud users are positively identified.
Detective controls
Detective controls are intended to detect and react appropriately to any incidents that occur. In the event of an attack, a detective control will signal the preventative or corrective controls to address the issue. System and network security monitoring, including intrusion detection and prevention arrangements, are typically employed to detect attacks on cloud systems and the supporting communications infrastructure.
Corrective controls
Corrective controls reduce the consequences of an incident, normally by limiting the damage. They come into effect during or after an incident. Restoring system backups in order to rebuild a compromised system is an example of a corrective control.


Essay Competition

निजामती सेवा दिवस २०७४ को सन्दर्भमा निबन्ध प्रतियोगिताको आह्वान १. निबन्धको शिर्षक: "संघियताको कार्यान्वयनमा निजामती सेवाको भूमिका" २. सहभागी: निजामती…

2017-08-15

Invitation for Bids for supply ,delivery and implementation of cloud based software.

                                       …

2017-02-28

Invitation for Bids for Procurement of Software/Hardware and Implementation of Disater Recovery Centre of PKI Data Centre

Invitation for Bids for Procurement of Software/Hardware and Implementation of Disater Recovery Centre of PKI Data Centre Invitation for Bids…

2015-06-24

Message from Controller

Office of Controller of Certification is formed under the ministry of Science, Technology and Environment with a view to implement Electronic Transaction Act 2063 and implementing digital signature in Nepal,…

Mr. Deepak Kumar Shrestha
Read More

Suchana Adhikaari

Mr.Anil Kumar Dutta
Read More

Acts and Regulation : DOWNLOAD