-
Book Overview & Buying
-
Table Of Contents
Cloud Security Handbook - Second Edition
By :
In the previous three chapters, we covered computing services. After that, the second most common resource when designing applications is storage – from object storage to block storage (which is also known as instance-attached storage), file storage to Container Storage Interface (CSI).
We use storage services to store our data. Most applications require persistent storage for storing and retrieving data – from banks holding customers’ financial records, e-commerce sites containing a product catalog, healthcare organizations storing patient data, and more.
The following is a list of common threats that might impact our data because it has been stored in the cloud:
This chapter will cover all types of storage services and provide you with best practices on how to securely connect and use each of them.
In this chapter, we will cover the following...