Moving Legacy Software and FOSS to the Cloud, Securely
As more organizations consider the benefits of cloud adoption and use of legacy or freeand open source software (FOSS) to lower the cost of software engineering andinformation technology projects, the security implications of this model take center stage.Cloud is not a one-size-fits-all solution and any effort to adopt distributed data servicesmust integrate information assurance early in the project. Correspondingly, transitioninglegacy software or FOSS into a cloud environment has the added disadvantage ofpotentially injecting serious security challenges incurred when the code was originallydeveloped. This paper investigates existing methods, and proposes a practical approach,for mitigating risks associated with transition of legacy software and FOSS to the cloud.
36567 (PDF, 9.00MB)
28 Dec 2015Related Content
Cloud Security Monitoring on AWS
Research PaperCloud services adoption is growing massively year over year. In most cases, moving to the cloud...
- 8 Feb 2021
Firebase: Google Cloud's Evil Twin
Research PaperFirebase allows a frontend application to connect directly to a backend database. Security wonks...
- 8 Oct 2020
- Brandon Evans
Compliance Benchmarks using Cloud Custodian
Research PaperWith the increased cloud adaption rate, many companies are looking for ready to use product...
- 25 Sep 2020
Top 5 Considerations for Multicloud Security
Research PaperThe move to leveraging multiple public cloud providers introduces new challenges and opportunities...
- 15 Apr 2020
- Brandon Evans
Cybersecurity in the Age of the Cloud
Research PaperThe hand-selected resources in this eBook provide a well-rounded look at cybersecurity...
- 21 Feb 2020
- Frank Kim
Secure Internet Gateways: Backing Down from a Fight
Research PaperWhen does a security agent become a double agent? On-premise corporate devices are protected by a...
- 2 Nov 2018
Intrusion detection through traffic analysis from the endpoint using Splunk Stream
Research PaperWith technologies such as software-defined wide area networking (SD-WAN) and cloud operations, the...
- 24 May 2017
Cyber Security Trends: Aiming Ahead of the Target to Increase Security in 2017
Research PaperAttackers are always changing their methods, but some cybersecurity trends are clear--and...
- 20 Mar 2017
An Introduction To Securing a Cloud Environment
Research PaperWhile Cloud services offer flexibility, scalability and economies of scale, there have...
- 27 Nov 2012
Cloud Computing - Maze in the Haze
Research PaperWhen Amazon announced its EC2 environment in August 2006, one might not have imagined the change in...
- 18 Oct 2011
Following Incidents into the Cloud
Research PaperThe increased level of complexity which cloud computing has introduced to incident handling is not...
- 1 Mar 2011
Step by Step Installation of a Secure Linux Web, DNS and Mail Server
Research PaperThis paper will show how the author configured a Linux based web and e-mail server for a small...
- 8 Apr 2004
The Art of Web Filtering
Research PaperWeb Filters are designed to improve the security and productivity of a network, but as with anything...
- 8 Apr 2004
Secure OS Environments for Linux
Research PaperIn this paper I make a review of the main set of tools and resources available for Linux system...
- 3 Jun 2003
The Consumer Desktop - The Weak Link in Internet Security and Why ISP's Are Uniquely Positio
Research PaperThe Internet community today is seeing a rapidly growing number of distributed denial-of-service...
- 11 Mar 2003
Norton AntiVirus C.E 7.6
Research PaperSince the Introduction of Norton Antivirus 7.x, Symantec have managed to created a truly remarkable...
- 10 Oct 2001
Security Strengths and Weaknesses of Two Popular Web Servers
Research PaperAs the mediator between your business and the world the Web Server that you choose must be...
- 19 Aug 2001
Using Snort v1.8 with SnortSnarf on a RedHat Linux System
Research PaperTo effectively implement system and network security, a multi pronged approach should be used....
- 25 Jul 2001
