Page 602 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 602

be offered for free. Although an organization’s or individual’s data is
               usually kept separated and isolated from other customers’ data in a

               public cloud, the overall purpose or use of the cloud is the same for all
               customers.

               Hybrid A hybrid cloud is a mixture of private and public cloud
               components. For example, an organization could host a private cloud
               for exclusive internal use but distribute some resources onto a public
               cloud for the public, business partners, customers, the external sales

               force, and so on.
               Community A community cloud is a cloud environment maintained,

               used, and paid for by a group of users or organizations for their shared
               benefit, such as collaboration and data exchange. This may allow for
               some cost savings compared to accessing private or public clouds
               independently.

               Cloud computing is a natural extension and evolution of virtualization,
               the internet, distributed architecture, and the need for ubiquitous

               access to data and resources. However, it does have some issues,
               including privacy concerns, regulation compliance difficulties, use of
               open/closed-source solutions, adoption of open standards, and
               whether or not cloud-based data is actually secured (or even
               securable).

               Cloud solutions often have lower up-front costs, lower maintenance
               costs, vendor-maintained security, and scalable resources, and they

               usually have high levels of uptime and availability from anywhere
               (over the internet). However, cloud solutions do not offer customer
               control over the OS and software, such as updates and configuration
               changes; provide minimal customization; and are often inaccessible
               without internet connectivity. In addition, the security policies of the
               cloud provider might not match those of the organization.

               Cloud computing and virtualization, especially when you are

               virtualizing in the cloud, have serious risks associated with them. Once
               sensitive, confidential, or proprietary data leaves the confines of the
               organization, it also leaves the protections imposed by the
               organizational security policy and resultant infrastructure. Cloud
               services and their personnel might not adhere to the same security
   597   598   599   600   601   602   603   604   605   606   607