Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. (Wikipedia)
Links:
Links:
Links:
Links:
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/azureadb2c-overview.png
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/sign-in-small.png
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/scenario-singlesignon.png
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/scenario-progressive.png
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/scenario-idproofing.png
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/woodgrove-overview.png
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/technical-overview/identities.png
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/technical-overview/protocols.png
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/technical-overview/seamless-ux.png
Links:
Links:
Source: https://docs.microsoft.com/en-us/azure/sentinel/media/tutorial-monitor-data/access-workbooks.png
Source: https://docs.microsoft.com/en-us/azure/sentinel/media/tutorial-investigate-cases/map-timeline.png
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/example-email-footerv2.png
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/excelproplus-infoprotect-bar.png
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms_useractivation2.png
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms_documentprotection1.png
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms_documentprotection2.png
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms_documentprotection3.png
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms_documentconsumption1.png
Source: https://docs.aws.amazon.com/dynamodb-encryption-client/latest/devguide/images/arch-encrypt.png
Links:
Source: https://docs.microsoft.com/en-us/azure/security-center/media/security-center-intro/sc-dashboard.png
Source: https://docs.microsoft.com/en-us/azure/security-center/media/security-center-intro/sc-net-map.png
Source: https://d1.awsstatic.com/re19/Diagram_Detective.93ebed7d2e3452fc03c6496bd7faf5b8f2ef9a6e.png
Links:
197 images
Cloud Data Centers Protection
Source: https://storage.googleapis.com/gweb-cloudblog-publish/images/next-security-2ffy3.max-700x700.PNG
Firewalls
Source: https://docs.microsoft.com/en-us/azure/firewall/media/overview/firewall-threat.png
Firewalls
Source: https://cloud.google.com/vpc/images/firewalls/firewall_overview_ingress_examples.svg
Firewalls
Source: https://cloud.google.com/vpc/images/firewalls/firewall_overview_egress_examples.svg
Firewalls
Source: https://cloud.google.com/vpc/images/firewall-rules-logs/firewall-rules-logging-1.svg
Firewalls
Source: https://cloud.google.com/vpc/images/firewall-rules-logs/firewall-rules-logging-2.svg
Firewalls
Source: https://cloud.google.com/vpc/images/firewall-rules-logs/firewall-rules-logging-3.svg
Firewalls
Source: https://cloud.google.com/vpc/images/detailednetworkingdiagram.png
DDoS Protection
Source: https://www.testpreptraining.com/tutorial/wp-content/uploads/2019/09/image-284.png
DDoS Protection
Source: https://docs.microsoft.com/en-us/azure/virtual-network/media/ddos-protection-overview/mitigation.png
DDoS Protection
Source: https://cloud.google.com/armor/images/ca-cdn-origins.svg
Web Application Firewalls (WAF)
Source: https://docs.microsoft.com/en-us/azure/web-application-firewall/media/overview/wafoverview.png
Web Application Firewalls (WAF)
Source: https://docs.microsoft.com/en-us/azure/web-application-firewall/media/ag-overview/waf1.png
Identity & Access Management (IAM) for Infrastructure
Source: https://docs.aws.amazon.com/IAM/latest/UserGuide/images/intro-diagram%20_policies_800.png
Identity & Access Management (IAM) for Infrastructure
Source: https://docs.aws.amazon.com/IAM/latest/UserGuide/images/iam-intro-account-with-users.diagram.png
Identity & Access Management (IAM) for Infrastructure
Source: https://docs.aws.amazon.com/IAM/latest/UserGuide/images/iam-intro-federation.diagram.png
Identity & Access Management (IAM) for Infrastructure
Source: https://docs.aws.amazon.com/IAM/latest/UserGuide/images/policy_summaries-diagram.png
Identity & Access Management (IAM) for Infrastructure
Source: https://docs.aws.amazon.com/IAM/latest/UserGuide/images/iam-intro-users-and-groups.diagram.png
Identity & Access Management (IAM) for Infrastructure
Source: https://cloud.google.com/iam/img/iam-overview-basics.svg
Identity & Access Management (IAM) for Infrastructure
Source: https://cloud.google.com/iam/img/role-and-permissions.svg
Identity & Access Management (IAM) for Infrastructure
Source: https://cloud.google.com/iam/img/iam-overview-policy.png
Identity & Access Management (IAM) for Infrastructure
Source: https://cloud.google.com/iam/img/policy-hierarchy.png
Identity & Access Management for Apps
Source: https://docs.aws.amazon.com/cognito/latest/developerguide/images/scenario-authentication-cup.png
Identity & Access Management for Apps
Source: https://docs.aws.amazon.com/cognito/latest/developerguide/images/scenario-standalone.png
Identity & Access Management for Apps
Source: https://docs.aws.amazon.com/cognito/latest/developerguide/images/scenario-api-gateway.png
Identity & Access Management for Apps
Source: https://docs.aws.amazon.com/cognito/latest/developerguide/images/scenario-cup-cib.png
Identity & Access Management for Apps
Source: https://docs.aws.amazon.com/cognito/latest/developerguide/images/scenario-cup-cib2.png
Identity & Access Management for Apps
Source: https://docs.aws.amazon.com/cognito/latest/developerguide/images/scenario-identity-pool.png
Identity & Access Management for Apps
Source: https://docs.aws.amazon.com/cognito/latest/developerguide/images/scenario-appsync.png
Identity & Access Management for Apps
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/azureadb2c-overview.png
Identity & Access Management for Apps
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/sign-in-small.png
Identity & Access Management for Apps
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/scenario-singlesignon.png
Identity & Access Management for Apps
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/scenario-progressive.png
Identity & Access Management for Apps
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/scenario-idproofing.png
Identity & Access Management for Apps
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/woodgrove-overview.png
Identity & Access Management for Apps
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/sign-in.png
Identity & Access Management for Apps
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/overview/sign-up.png
Identity & Access Management for Apps
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/technical-overview/identities.png
Identity & Access Management for Apps
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/technical-overview/protocols.png
Identity & Access Management for Apps
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/technical-overview/seamless-ux.png
Identity & Access Management for Apps
Source: https://docs.microsoft.com/en-us/azure/active-directory-b2c/media/technical-overview/user-data.png
Identity & Access Management for Apps
Source: https://firebase.google.com/docs/auth/images/auth-providers.png
Identity & Access Management for Apps
Source: https://firebase.google.com/docs/auth/images/firebaseui-ios.png
Directory Service
Source: https://ars.els-cdn.com/content/image/3-s2.0-B9781785480041500055-f05-07-9781785480041.jpg?_
Directory Service
Source: https://cloud.google.com/managed-microsoft-ad/img/groups.svg
Directory Service
Source: https://cloud.google.com/managed-microsoft-ad/docs/images/best-practices-1.svg
Directory Service
Source: https://cloud.google.com/managed-microsoft-ad/docs/images/best-practices-2.svg
Directory Service
Source: https://cloud.google.com/managed-microsoft-ad/docs/images/best-practices-3.svg
Directory Service
Source: https://cloud.google.com/managed-microsoft-ad/docs/images/best-practices-4.svg
Directory Service
Source: https://cloud.google.com/managed-microsoft-ad/docs/images/best-practices-5.svg
Directory Service
Source: https://cloud.google.com/managed-microsoft-ad/docs/images/best-practices-6.svg
Directory Service
Source: https://cloud.google.com/managed-microsoft-ad/docs/images/best-practices-7.svg
Directory Service
Source: https://cloud.google.com/managed-microsoft-ad/img/fw-1.png
Key Management Services
Source: https://docs.aws.amazon.com/kms/latest/developerguide/images/generate-data-key.png
Key Management Services
Source: https://docs.aws.amazon.com/kms/latest/developerguide/images/encrypt-with-data-key.png
Key Management Services
Source: https://docs.aws.amazon.com/kms/latest/developerguide/images/decrypt.png
Key Management Services
Source: https://docs.aws.amazon.com/kms/latest/developerguide/images/generate-data-key-pair.png
Key Management Services
Source: https://docs.aws.amazon.com/kms/latest/developerguide/images/encrypt-with-data-key-pair.png
Key Management Services
Source: https://docs.aws.amazon.com/kms/latest/developerguide/images/decrypt-with-data-key-pair.png
Key Management Services
Source: https://docs.aws.amazon.com/kms/latest/developerguide/images/sign-with-data-key-pair.png
Key Management Services
Source: https://docs.aws.amazon.com/kms/latest/developerguide/images/verify-with-data-key-pair.png
Key Management Services
Source: https://docs.aws.amazon.com/kms/latest/developerguide/images/key-hierarchy-master.png
Key Management Services
Source: https://docs.aws.amazon.com/kms/latest/developerguide/images/key-hierarchy-cmk.png
Key Management Services
Source: https://docs.aws.amazon.com/secretsmanager/latest/userguide/images/ASM-Basic-Scenario.png
Key Management Services
Source: https://docs.aws.amazon.com/secretsmanager/latest/userguide/images/secret-concept.png
Key Management Services
Source: https://docs.microsoft.com/en-us/azure/key-vault/media/key-vault-whatis/msi.png
Key Management Services
Source: https://docs.microsoft.com/en-us/azure/key-vault/media/key-vault-whatis/azurekeyvault_overview.png
Key Management Services
Source: https://cloud.google.com/kms/images/envelope_encryption_store.svg
Key Management Services
Source: https://cloud.google.com/kms/images/envelope_encryption_retrieve.svg
Key Management Services
Source: https://cloud.google.com/kms/images/cloud_ekm_encryption_diagram.png
Certificates Managers
Source: https://docs.aws.amazon.com/acm-pca/latest/userguide/images/simple-ca-tree.png
Certificates Managers
Source: https://docs.aws.amazon.com/acm-pca/latest/userguide/images/chain-of-trust.png
Certificates Managers
Source: https://docs.aws.amazon.com/acm-pca/latest/userguide/images/multilevel-ca-tree.png
Certificates Managers
Source: https://docs.aws.amazon.com/acm-pca/latest/userguide/images/path-length.png
Certificates Managers
Source: https://docs.aws.amazon.com/acm-pca/latest/userguide/images/validity.png
Certificates Managers
Source: https://cloud.google.com/load-balancing/images/target-proxy-with-ssl-certs.svg
Certificates Managers
Source: https://cloud.google.com/load-balancing/images/multi-ssl-1.svg
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/sentinel/media/overview/core-capabilities.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/sentinel/media/collect-data/collect-data-page.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/sentinel/media/tutorial-monitor-data/access-workbooks.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/sentinel/media/tutorial-investigate-cases/map-timeline.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/sentinel/media/overview/hunting.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/sentinel/media/qs-get-visibility/overview.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/sentinel/media/qs-get-visibility/funnel.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/sentinel/media/qs-get-visibility/map.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/sentinel/media/qs-get-visibility/anomolies.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/sentinel/media/qs-get-visibility/palo-alto-week-query.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/example-email-footerv2.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/excelproplus-infoprotect-bar.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms_elements.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms_useractivation2.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms_documentprotection1.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms_documentprotection2.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms_documentprotection3.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms_documentconsumption1.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms_documentconsumption2.png
Intelligent Data Protection
Source: https://docs.microsoft.com/en-us/azure/information-protection/media/azrms_documentconsumption3.png
Encryption Tools
Source: https://docs.aws.amazon.com/dynamodb-encryption-client/latest/devguide/images/arch-encrypt.png
Encryption Tools
Source: https://docs.aws.amazon.com/dynamodb-encryption-client/latest/devguide/images/arch-decrypt.png
Hardware Security Modules (HSMs)
Source: https://docs.microsoft.com/en-us/azure/dedicated-hsm/media/high-availability/high-availability.png
Hardware Security Modules (HSMs)
Source: https://cloud.google.com/images/security/whitepaper-chart-01.png
Hardware Security Modules (HSMs)
Source: https://cloud.google.com/images/security/whitepaper-chart-02.png
Security Hubs
Source: https://docs.microsoft.com/en-us/azure/security-center/media/security-center-intro/sc-dashboard.png
Security Hubs
Source: https://docs.microsoft.com/en-us/azure/security-center/media/security-center-intro/sc-net-map.png
Detection & Analysis Services
Source: https://d1.awsstatic.com/re19/Diagram_Detective.93ebed7d2e3452fc03c6496bd7faf5b8f2ef9a6e.png
Detection & Analysis Services
Source: https://d1.awsstatic.com/re19/Geolocation_LegendLeft.a35519d26146c5d7b13de1dfebc2698f2f00ff03.png
Detection & Analysis Services
Source: https://d1.awsstatic.com/re19/morocco-2.7feae3d76a2868b80eea77597c13bb4f0975d7ee.png
Detection & Analysis Services
Source: https://cloud.google.com/logging/docs/images/audit_log_config_ui_single_service.png
Compliance
Source: https://docs.aws.amazon.com/config/latest/developerguide/images/how-AWSconfig-works.png