Skip to main content

Cloud Security Guidance IBM Recommendations for the Implementation of Cloud Security

An IBM Redpaper publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 30 October 2009, updated 02 November 2009

  1. .PDF (0.9 MB)

Share this page:   

IBM Form #: REDP-4614-00


Authors: Axel Buecker, Koos Lodewijkx, Harold Moss, Kevin Skapinetz and Michael Waidner

menu icon

Abstract

Cloud computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all processes, applications, and services provisioned "on demand", regardless of user location or device. As a result, cloud computing gives organizations the opportunity to increase their service delivery efficiencies, streamline IT management, and better align IT services with dynamic business requirements. In many ways, cloud computing offers the "best of both worlds", providing solid support for core business functions along with the capacity to develop new and innovative services.

In addition to the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. The "externalized" aspect of outsourcing makes it harder to maintain data integrity and privacy, support data and service availability, and demonstrate compliance.

The security measures discussed in this IBM Redpapers™ publication represent best practice implementations for cloud security.

Table of Contents

Introduction to cloud computing

Cloud security: the grand challenge

Evaluate different models of cloud computing

Examine the IBM Security Framework

Guide to implementing a secure cloud

Summary