Book description
Product Description
Well-known security experts decipher the most challenging aspect of cloud computing-security
Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces.
The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support.
Begins with an overview of the fundamentals of Cloud computing, and progresses to coverage of service delivery approaches, deployment models, software as a service, platform as a service, and security governance
Tackles the difficult areas of data ownership, privacy protections, bandwidth costs, data protection, and more
Examines Cloud computing risk management, compliance and legal responsibilities of remotely stored and maintained data, life cycle management, and disaster recovery planning from the perspective of the user and the Cloud provider
Addresses handling of incidents and remediation, application security, encryption issues, storage, virtualization mechanisms and vulnerabilities, and access control
As the most current and complete guide to helping you find your way through a maze of security minefields, this book is mandatory reading if you are involved in any aspect of cloud computing.
Table of contents
- Copyright
- About the Authors
- Credits
- Acknowledgments
- Foreword
- Introduction
- 1. Cloud Computing Fundamentals
- 2. Cloud Computing Architecture
-
3. Cloud Computing Software Security Fundamentals
- 3.1. Cloud Information Security Objectives
- 3.2. Cloud Security Services
- 3.3. Relevant Cloud Security Design Principles
- 3.4. Secure Cloud Software Requirements
-
3.5. Secure Cloud Software Testing
- 3.5.1. Testing for Security Quality Assurance
- 3.5.2. Cloud Penetration Testing
- 3.5.3. Legal and Ethical Implications
- 3.5.4. Regression Testing
- 3.6. Cloud Computing and Business Continuity Planning/Disaster Recovery
- 3.7. Summary
- 3.8. Notes
-
4. Cloud Computing Risk Issues
- 4.1. The CIA Triad
-
4.2. Privacy and Compliance Risks
- 4.2.1. The Payment Card Industry Data Security Standard (PCI DSS)
-
4.2.2. Information Privacy and Privacy Laws
- 4.2.2.1. Privacy Legislation
- 4.2.2.2. Health Insurance Portability and Accountability Act (HIPAA)
- 4.2.2.3. HITECH Act
- 4.2.2.4. Platform for Privacy Preferences (P3P)
- 4.2.2.5. PATRIOT Act
- 4.2.2.6. Federal Information Security Management Act (FISMA)
- 4.2.2.7. Other Privacy-Related Acts
- 4.2.2.8. European Union (EU) Principles
- 4.3. Threats to Infrastructure, Data, and Access Control
- 4.4. Cloud Service Provider Risks
- 4.5. Summary
- 4.6. Notes
-
5. Cloud Computing Security Challenges
- 5.1. Security Policy Implementation
-
5.2. Virtualization Security Management
- 5.2.1. Virtual Threats
-
5.2.2. VM Security Recommendations
-
5.2.2.1. Best Practice Security Techniques
- 5.2.2.1.1. Hardening the Host Operating System
- 5.2.2.1.2. Limiting Physical Access to the Host
- 5.2.2.1.3. Using Encrypted Communications
- 5.2.2.1.4. Disabling Background Tasks
- 5.2.2.1.5. Updating and Patching
- 5.2.2.1.6. Enabling Perimeter Defense on the VM
- 5.2.2.1.7. Implementing File Integrity Checks
- 5.2.2.1.8. Maintaining Backups
-
5.2.2.1. Best Practice Security Techniques
-
5.2.3. VM-Specific Security Techniques
-
5.2.3.1. Hardening the Virtual Machine
- 5.2.3.1.1. Harden the Hypervisor
- 5.2.3.1.2. Root Secure the Monitor
- 5.2.3.1.3. Implement Only One Primary Function per VM
- 5.2.3.1.4. Firewall Any Additional VM Ports
- 5.2.3.1.5. Harden the Host Domain
- 5.2.3.1.6. Use Unique NICs for Sensitive VMs
- 5.2.3.1.7. Disconnect Unused Devices
- 5.2.3.1.8. Additional VM Recommendations
- 5.2.3.2. Securing VM Remote Access
-
5.2.3.1. Hardening the Virtual Machine
- 5.3. Summary
- 5.4. Notes
-
6. Cloud Computing Security Architecture
-
6.1. Architectural Considerations
- 6.1.1. General Issues
- 6.1.2. Trusted Cloud Computing
-
6.1.3. Secure Execution Environments and Communications
- 6.1.3.1. Secure Execution Environment
-
6.1.3.2. Secure Communications
- 6.1.3.2.1. APIs
- 6.1.3.2.2. Virtual Private Networks
- 6.1.3.2.3. Remote Access VPNs
- 6.1.3.2.4. Network-to-Network VPNs
- 6.1.3.2.5. VPN Tunneling
- 6.1.3.2.6. Public Key Infrastructure and Encryption Key Management
- 6.1.3.2.7. Digital Certificates
- 6.1.3.2.8. Directories and X.500
- 6.1.3.2.9. The Lightweight Directory Access Protocol
- 6.1.3.2.10. X.509 Certificates
- 6.1.3.2.11. Certificate Revocation Lists
- 6.1.3.2.12. Key Management
- 6.1.3.2.13. Key Distribution
- 6.1.3.2.14. Key Revocation
- 6.1.3.2.15. Key Recovery
- 6.1.3.2.16. Key Renewal
- 6.1.3.2.17. Key Destruction
- 6.1.3.2.18. Multiple Keys
- 6.1.3.2.19. Distributed versus Centralized Key Management
- 6.1.3.2.20. Further Considerations
- 6.1.4. Microarchitectures
- 6.2. Identity Management and Access Control
- 6.3. Autonomic Security
- 6.4. Summary
- 6.5. Notes
-
6.1. Architectural Considerations
-
7. Cloud Computing Life Cycle Issues
-
7.1. Standards
- 7.1.1. Jericho Forum
- 7.1.2. The Distributed Management Task Force (DMTF)
-
7.1.3. The International Organization for Standardization (ISO)
- 7.1.3.1. ISO 27001
- 7.1.3.2. ISO 27002
- 7.1.3.3. ISO 27003
- 7.1.3.4. ISO 27004
- 7.1.3.5. ISO 27005
- 7.1.3.6. ISO 27006
- 7.1.3.7. International Organization for Standardization/International Electrotechnical Commission ISO/IEC 29361, ISO/IEC 29362, and ISO/IEC 29363 Standards
- 7.1.3.8. Distributed Application Platforms and Services
- 7.1.4. The European Telecommunications Standards Institute (ETSI)
- 7.1.5. The Organization for the Advancement of Structured Information Standards (OASIS)
- 7.1.6. Storage Networking Industry Association (SNIA)
- 7.1.7. Open Grid Forum (OGF)
- 7.1.8. The Open Web Application Security Project (OWASP)
- 7.2. Incident Response
- 7.3. Encryption and Key Management
- 7.4. Retirement
- 7.5. Summary
- 7.6. Notes
-
7.1. Standards
-
8. Useful Next Steps and Approaches
- 8.1. Getting Answers
- 8.2. Getting Help
-
8.3. Getting Started
-
8.3.1. Top Ten List
- 8.3.1.1. Assess Your Data's Sensitivity
- 8.3.1.2. Analyze the Risks vs. Benefits of Cloud Computing
- 8.3.1.3. Define Business Objectives
- 8.3.1.4. Understand the Underlying Structure of Your Network
- 8.3.1.5. Implement Traditional Best Practice Security Solutions
- 8.3.1.6. Employ Virtualization Best Practices
- 8.3.1.7. Prevent Data Loss with Backups
- 8.3.1.8. Monitor and Audit
- 8.3.1.9. Seek Out Advice
- 8.3.1.10. Employ Deception
-
8.3.1. Top Ten List
- 8.4. Parting Words
- 8.5. Notes
- A. Glossary of Terms and Acronyms
-
References
Product information
- Title: Cloud Security: A Comprehensive Guide to Secure Cloud Computing
- Author(s):
- Release date: August 2010
- Publisher(s): Wiley
- ISBN: 9780470589878
You might also like
book
Cloud Computing Security
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical …
book
Cloud Computing Security, 2nd Edition
Overview of cloud computing security technology and implementation. Explores practical solutions to a wide range of …
book
Cloud security
This lesson is for engineers and cloud architects designing and planning cloud infrastructure security. It covers …
book
Cloud Native Security
Explore the latest and most comprehensive guide to securing your Cloud Native technology stack Cloud Native …