The movement to cloud computing, in which computing resources are moved to third-party providers that maintain large data centers, requires new approaches to security since an organization no longer has control over the security of its data and systems.
Cloud based cyber security consists of the controls, policies, procedures and technology that is used to secure cloud based computer systems, data and infrastructure. Authentication of users and the functions they are allowed to perform and the systems they have access to is central to this effort. In addition cloud security must be configured to each business that uses the cloud facility including controlling their systems, data access, communication networks and traffic filtering. This type of security is typically managed from a centralized management function by the cloud computing provider. The implementation of specific security requirements is, however, a collaborative process between the organization and the cloud provider.