Hybrid Cloud SecurityLatest ResearchWorking Group
- The hybrid cloud is an effective way to enjoy the benefits of public cloud without disrupting critical and core legacy services on private cloud.
- A hybrid cloud may offer effective means to securely use cloud technologies.
- A hybrid cloud can help enterprises leverage cloud resources at optimal costs.
Hybrid Cloud SecurityCloud Security Services ManagementEnterprise ArchitectureCloud Component Specifications
Discuss this topic in CircleView discussion community
Hybrid Cloud Security Research
CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.
Hybrid Cloud and Its Associated Risks
Cloud computing is flourishing. Hybrid clouds, especially, have been gaining more traction as cloud customers increasingly understand that using public clouds or private clouds alone poses certain limitations. This document aims to describe the concept and value of hybrid clouds, highlight key application scenarios and point out security risks in the hybrid cloud.
Mitigating Hybrid Clouds Risks
Hybrid clouds are often the starting point for organizations in their cloud journey. However, any cloud model consists of risks, threats, and vulnerabilities. After the review of risks, threats, and vulnerabilities for hybrid clouds, it’s critical to identify adequate mitigation controls. This document will cover countermeasures organizations can implement to improve hybrid cloud risk management and cybersecurity practices.
Secure Connection Requirements of Hybrid Cloud
Hybrid cloud is becoming an essential enterprise cloud model that allows the best of both worlds, providing customers with diverse resources to run different workloads depending on their needs. To successfully secure this complex landscape, enterprises should develop and employ perimeter, transmission, storage, and management cross-cloud security capabilities. This document from the Hybrid Cloud Security Working Group lists best practices for these four areas of security, along with their applicability to the Cloud Controls Matrix (CCM).