Book description
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment
Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources.
Provides necessary guidance to ensure auditors address security and privacy aspects that through a proper audit can provide a specified level of assurance for an organization's resources
Reveals effective methods for evaluating the security and privacy practices of cloud services
A cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA)
Timely and practical, Auditing Cloud Computing expertly provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers.
Table of contents
- Cover
- Title Page
- Copyright
- Dedication
- Preface
- Chapter 1: Introduction to Cloud Computing
- Chapter 2: Cloud-Based IT Audit Process
- Chapter 3: Cloud-Based IT Governance
-
Chapter 4: System and Infrastructure Lifecycle Management for the Cloud
- Every Decision Involves Making a Tradeoff
- What about Policy and Process Collisions?
- The System and Management Lifecycle Onion
- Mapping Control Methodologies onto the Cloud
- Verifying Your Lifecycle Management
- Risk Tolerance
- Special Considerations for Cross-Cloud Deployments
- The Cloud Provider's Perspective
- In Summary
- Chapter 5: Cloud-Based IT Service Delivery and Support
-
Chapter 6: Protection and Privacy of Information Assets in the Cloud
- The Three Usage Scenarios
- What Is a Cloud? Establishing the Context—Defining Cloud Solutions and their Characteristics
- The Cloud Security Continuum and a Cloud Security Reference Model
- Cloud Characteristics, Data Classification, and Information Lifecycle Management
- Regulatory and Compliance Implications
- A Cloud Information Asset Protection and Privacy Playbook
- In Summary
- Chapter 7: Business Continuity and Disaster Recovery
- Chapter 8: Global Regulation and Cloud Computing
- Chapter 9: Cloud Morphing: Shaping the Future of Cloud Computing Security and Audit
- Appendix: Cloud Computing Audit Checklist
- About the Editor
- About the Contributors
- Index
Product information
- Title: Auditing Cloud Computing: A Security and Privacy Guide
- Author(s):
- Release date: August 2011
- Publisher(s): Wiley
- ISBN: 9780470874745
You might also like
book
Modern Cryptography for Cybersecurity Professionals
As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the …
book
Designing Secure Software
Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant …
book
Infrastructure as Code, 2nd Edition
Six years ago, Infrastructure as Code was a new concept. Today, as even banks and other …
book
Data Classification
Comprehensive Coverage of the Entire Area of ClassificationResearch on the problem of classification tends to be …