Cloud Computing Protected describes the most important security challenges that organizations face as they seek to adopt public cloud services and implement their own cloud-based infrastructure. These emerging technologies introduce new risks: – Virtualization hinders monitoring and can lead to server sprawl. – Multi-tenancy exposes risks of data leakage to co-tenants. – Outsourcing reduces both control and visibility over services and data. – Internet delivery increases the exposure of valuable information assets. – Ambiguity in jurisdiction and national laws complicates compliance. – Lack of standardization can lead to lock-in binding customers to providers. Fortunately, there are also many security benefits that customers can enjoy as they implement cloud services: – Specialized providers can invest in best-in-class tools and expertise. – Contractual terms can define the function and scope of critical services. – Public services undergo scrutiny from the collective worldwide community. – Subscribing to multiple providers increases redundancy. – Global reach facilitates early alerts and consistent policy enforcement. This book looks at these and other areas where the advent of cloud computing has the opportunity to influence security risks, safeguards and processes.