O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CSA Guide to Cloud Computing

Book Description

CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA).

For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents.

The authors of CSA Guide to Cloud Computing provide a wealth of industry expertise you won't find anywhere else. Author Raj Samani is the Chief Technical Officer for McAfee EMEA; author Jim Reavis is the Executive Director of CSA; and author Brian Honan is recognized as an industry leader in the ISO27001 standard. They will walk you through everything you need to understand to implement a secure cloud computing structure for your enterprise or organization.

  • Your one-stop source for comprehensive understanding of cloud security from the foremost thought leaders in the industry
  • Insight into the most current research on cloud privacy and security, compiling information from CSA's global membership
  • Analysis of future security and privacy issues that will impact any enterprise that uses cloud computing

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Forewords
  6. About the Authors
  7. About the Cloud Security Alliance
  8. Acknowledgments
  9. CSA Guide to Cloud Computing—Introduction
  10. Chapter 1. Cloud Computing, What is it and What’s the Big Deal?
    1. Defining Cloud Computing
    2. Economic Opportunities for Cloud Computing
    3. The Cloud is “Not” Secure
  11. Chapter 2. Selecting and Engaging with a Cloud Service Provider
    1. Security, Trust and Assurance Repository Initiative
    2. Engaging with the Cloud Service Provider
  12. Chapter 3. The Cloud Threat Landscape
    1. The Cloud Threat Landscape
    2. Notorious Nine
    3. Additional Cloud Threats
  13. Chapter 4. Secure Cloud for Mobile Computing
    1. Mobile Top Threats: Evil 8.0
    2. Addressing the Threat: Mobile Components for Consideration
  14. Chapter 5. Making the Move into the Cloud
    1. Cloud Computing Checklist
    2. Security for the Cloud
  15. Chapter 6. Certification for Cloud Service Providers
    1. Certification for Cloud Service Providers
  16. Chapter 7. The Privacy Imperative
    1. Does Cloud Computing Make My Data Any Less Private?
    2. Privacy Level Agreement
    3. Data Protection Certification
  17. Chapter 8. Cloud Security Alliance Research
    1. Big Data Working Group
    2. Cloud Data Governance
    3. CloudCERT
    4. CloudTrust Protocol
    5. Enterprise Architecture Working Group
    6. Incident Management and Forensics
    7. Innovation Initiative
    8. Security as a Service
    9. Security Guidance for Critical Areas of Focus in Cloud Computing
    10. Software Defined Perimeter
  18. Chapter 9. Dark Clouds, What to Do In The Event of a Security Incident
    1. Building a Security Incident Response Team
    2. Incident Response Challenges in the Cloud
    3. The Future
  19. Chapter 10. The Future Cloud
    1. More, More, and More
    2. Cloud Computing for Critical Infrastructure
    3. Defining the Security Requirements for Tomorrow’s Cloud
  20. Appendix
  21. Index