It is now time to look in greater detail at the three main cloud service models. These are:
We will discuss each of these models and consider the security threats and mitigations that may apply in each case. Remember that each of the service models can be delivered using one of the deployment models discussed earlier, and therefore security considerations need to take into account both the service and deployment model being used.
Return to Table of Contents