Virtualisation 4.2 - aspects of virtualisation Flashcards
Which system of cloud security should you implement to ensure that only the appropriate users are allowed to perform actions on the stored data and access the applications?
Authorisation = is based on the user’s role, and the access provided is limited to specific cloud resources that are relevant to the user’s sphere of work. Authorization also extends to actual devices, such as servers, storage arrays, or applications, that are allowed access to databases.
ACL = access control list
Authentication will/will not
Will = correctly validating the identity of the user or host requesting access (e.g. login, biometrics, etc)
Not = control users’ permission to access cloud resources.
Applying the latest software patches is essential to cover known …
security threats inside the operating system (OS) or applications.