This document discusses security management in cloud computing. It addresses two key questions - what security controls must customers provide in addition to those of the cloud platform, and how must an enterprise's security tools and processes adapt to manage security in the cloud. It covers security monitoring and management services, information security for data and infrastructure, common security standards like ISO 27001 and 27002, and how security management differs in the cloud compared to traditional IT environments. It also discusses privacy issues like auditing, breaches, compliance and the data lifecycle involving generation, use, transformation, storage, archival and destruction of data in the cloud.
Related topics: