Talk:Cloud computing security
![]() | Computer security: Computing Unassessed | |||||||||||||||||
|
Merge with Computer Security?
There is nothing in this article that is distinct from the Computer Security article. We should probably consider merging this with Computer Security unless someone can come up with something that distinguishes "Cloud Computer" security from ordinary computer security. John (talk) 19:54, 26 April 2010 (UTC)
- While I'm unconvinced by the need for, and quality of this article I do think the subject is notable and the issues distinct as an application of computer security. I'd be more inclined to tag, stub and/or merge it with cloud computing. After all, we do have a (similarly problematic) Internet security article. -- samj inout 13:15, 27 April 2010 (UTC)
- I've tagged this article {{original-research}} and proposed that it be merged into the cloud computing article as it's basically just a list that could be condensed into a few sentences there. -- samj inout 17:44, 2 May 2010 (UTC)
- I think you should merge it. John (talk) 18:00, 23 June 2010 (UTC)
- I've put up merge banners to see if there is any more input on this. --Kvng (talk) 18:44, 21 December 2011 (UTC)
I am a co-chair of the Cloud Security Alliance Virtualization Working Group. The fundamental difference between cloud security and computer security is that in cloud security, you do not have the level of control that is assumed to be present in most computer security, and you are dealing with a fundamentally shared environment. So while many computer security topics fit within the requirements of cloud computing security, there are cloud-specific topics outside the ___domain of computer security. For this reason, they should be separate. Note also that CSA and NIST have separate cloud definitions and security guidelines apart from their core computer security guidelines. — Preceding unsigned comment added by 70.67.187.183 (talk) 00:37, 5 January 2012 (UTC)