| Display title | Cloud computing security |
| Default sort key | Cloud computing security |
| Page length (in bytes) | 53,594 |
| Namespace ID | 0 |
| Page ID | 25619904 |
| Page content language | en - English |
| Page content model | wikitext |
| Indexing by robots | Allowed |
| Number of page watchers | 101 |
| Number of page watchers who visited in the last 30 days | 4 |
| Number of redirects to this page | 7 |
| Counted as a content page | Yes |
| Wikidata item ID | Q370563 |
| Local description | Methods used to protect cloud based assets |
| Central description | broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing |
| Page views in the past 30 days | |
| Edit | Allow all users (no expiry set) |
| Move | Allow all users (no expiry set) |
| Page creator | Amoorthy (talk | contribs) |
| Date of page creation | 04:14, 31 December 2009 |
| Latest editor | Sunmist (talk | contribs) |
| Date of latest edit | 12:35, 29 October 2025 |
| Total number of edits | 650 |
| Recent number of edits (within past 30 days) | 4 |
| Recent number of distinct authors | 4 |
| Hidden categories (5) | This page is a member of 5 hidden categories (help):
|
| Transcluded templates (75) | Pages transcluded onto the current version of this page (help):
|
| Wikidata entities used in this page | |