LEADER 02351nam 2200445 450 001 996581165203316 005 20231205170136.0 010 $a1-5044-8996-9 035 $a(IEEE)9904594 035 $a(CKB)25047742700041 035 $a(NjHacI)9925047742700041 035 $a(EXLCZ)9925047742700041 100 $a20231205d2022 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a"White Paper - Cybersecurity in Agile Cloud Computing - Cybersecurity Guidelines for Cloud Access" /$fDavid Tayouri [and three others] 210 1$aNew York :$cIEEE,$d2022. 210 4$dİ2022 215 $a1 online resource (36 pages) 330 $aOrganizations demand immediate, uninterrupted access for their users, no matter where they are located. Digital business transformation efforts, adopting Software as a Service (SaaS), working from home (especially following the COVID-19 pandemic), and emerging edge computing platforms have changed how enterprises work. Digital business transformation requires anywhere, anytime access to applications and services--many of which are located in the cloud. The enterprise perimeter can now be everywhere--a dynamically created, policy-based secure access service edge. Enterprises want to protect their assets from unauthorized entities. Still, they also want to keep business continuity by allowing trusted devices and users to access applications hosted on-premises or in the cloud. To achieve this, one of the most critical security layers is secure remote access. This paper presents the cloud security guidelines and best practices, emphasizing secure remote access. 606 $aCloud computing 606 $aComputer security 606 $aComputer networks$xSecurity measures 615 0$aCloud computing. 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures. 676 $a004.6782 700 $aTayouri$b David$01592775 702 $aHassidim$b Snir 702 $aSmirnov$b Alex 702 $aShabtai$b Asaf 801 0$bNjHacI 801 1$bNjHacl 906 $aDOCUMENT 912 $a996581165203316 996 $a"White Paper - Cybersecurity in Agile Cloud Computing - Cybersecurity Guidelines for Cloud Access"$93912142 997 $aUNISA