ABSTRACT

Security management which is an aspect of policy management was discussed in Chapter 9. Identity management includes identification, authentication, and authorization and some of these concepts were discussed in Chapter 16. Integrity management will include maintaining the accuracy and quality of the data. Other security-related functions include governance, risk management, and backup and recovery. Since we discussed many of the secure cloud computing concepts in Chapter 16, we will not discuss them here. In the remaining sections of this chapter, we will discuss each of the functions that we have mentioned in this section including secure OSs and hypervisors, secure data storage, secure data management, secure networks, security and integrity management, and secure applications.