Book description
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure.
Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking.
- Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability
- Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services
- Discover which security management frameworks and standards are relevant for the cloud
- Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models
- Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider
- Examine security delivered as a service-a different facet of cloud security
Publisher resources
Table of contents
- Cloud Security and Privacy
- SPECIAL OFFER: Upgrade this ebook with O’Reilly
- Preface
- 1. Introduction
-
2. What Is Cloud Computing?
- Cloud Computing Defined
- The SPI Framework for Cloud Computing
- The Traditional Software Model
- The Cloud Services Delivery Model
- Cloud Deployment Models
- Key Drivers to Adopting the Cloud
- The Impact of Cloud Computing on Users
- Governance in the Cloud
- Barriers to Cloud Computing Adoption in the Enterprise
- Summary
-
3. Infrastructure Security
- Infrastructure Security: The Network Level
- Infrastructure Security: The Host Level
- Infrastructure Security: The Application Level
- Summary
- 4. Data Security and Storage
-
5. Identity and Access Management
- Trust Boundaries and IAM
- Why IAM?
- IAM Challenges
- IAM Definitions
- IAM Architecture and Practice
- Getting Ready for the Cloud
- Relevant IAM Standards and Protocols for Cloud Services
- IAM Practices in the Cloud
- Cloud Authorization Management
- Cloud Service Provider IAM Practice
- Guidance
- Summary
-
6. Security Management in the Cloud
- Security Management Standards
- Security Management in the Cloud
- Availability Management
- SaaS Availability Management
- PaaS Availability Management
- IaaS Availability Management
- Access Control
- Security Vulnerability, Patch, and Configuration Management
- Summary
-
7. Privacy
- What Is Privacy?
- What Is the Data Life Cycle?
- What Are the Key Privacy Concerns in the Cloud?
- Who Is Responsible for Protecting Privacy?
- Changes to Privacy Risk Management and Compliance in Relation to Cloud Computing
- Legal and Regulatory Implications
- U.S. Laws and Regulations
- International Laws and Regulations
- Summary
-
8. Audit and Compliance
- Internal Policy Compliance
- Governance, Risk, and Compliance (GRC)
-
Illustrative Control Objectives for Cloud Computing
- A.5 Security policy
- A.6 Organization of information security
- A.7 Asset management
- A.8 Human resources security
- A.9 Physical and environmental security
- A.10 Communications and operations management
- A.11 Access control
- A.12 Information systems acquisition, development, and maintenance
- A.13 Information security incident management
- A.14 Business continuity management
- A.15 Compliance
- Incremental CSP-Specific Control Objectives
- Additional Key Management Control Objectives
- Control Considerations for CSP Users
- Regulatory/External Compliance
- Other Requirements
- Cloud Security Alliance
- Auditing the Cloud for Compliance
- Summary
- 9. Examples of Cloud Service Providers
- 10. Security-As-a-[Cloud] Service
- 11. The Impact of Cloud Computing on the Role of Corporate IT
- 12. Conclusion, and the Future of the Cloud
- A. SAS 70 Report Content Example
- B. SysTrust Report Content Example
- C. Open Security Architecture for Cloud Computing
- Glossary
- Index
- About the Authors
- Colophon
- SPECIAL OFFER: Upgrade this ebook with O’Reilly
- Copyright
Product information
- Title: Cloud Security and Privacy
- Author(s):
- Release date: September 2009
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781449379513
You might also like
book
Cloud security
This lesson is for engineers and cloud architects designing and planning cloud infrastructure security. It covers …
book
Cloud Security Handbook
A comprehensive reference guide to securing the basic building blocks of cloud services, with actual examples …
book
Cloud Computing Security, 2nd Edition
Overview of cloud computing security technology and implementation. Explores practical solutions to a wide range of …
book
Practical Cloud Security
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and …