- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn…mehr
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 3.19MB
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: O'Reilly Media
- Seitenzahl: 338
- Erscheinungstermin: 4. September 2009
- Englisch
- ISBN-13: 9781449391881
- Artikelnr.: 53346337
- Verlag: O'Reilly Media
- Seitenzahl: 338
- Erscheinungstermin: 4. September 2009
- Englisch
- ISBN-13: 9781449391881
- Artikelnr.: 53346337
Chapter 1 Introduction
Mind the Gap
The Evolution of Cloud Computing
Summary
Chapter 2 What Is Cloud Computing?
Cloud Computing Defined
The SPI Framework for Cloud Computing
The Traditional Software Model
The Cloud Services Delivery Model
Cloud Deployment Models
Key Drivers to Adopting the Cloud
The Impact of Cloud Computing on Users
Governance in the Cloud
Barriers to Cloud Computing Adoption in the Enterprise
Summary
Chapter 3 Infrastructure Security
Infrastructure Security: The Network Level
Infrastructure Security: The Host Level
Infrastructure Security: The Application Level
Summary
Chapter 4 Data Security and Storage
Aspects of Data Security
Data Security Mitigation
Provider Data and Its Security
Summary
Chapter 5 Identity and Access Management
Trust Boundaries and IAM
Why IAM?
IAM Challenges
IAM Definitions
IAM Architecture and Practice
Getting Ready for the Cloud
Relevant IAM Standards and Protocols for Cloud Services
IAM Practices in the Cloud
Cloud Authorization Management
Cloud Service Provider IAM Practice
Guidance
Summary
Chapter 6 Security Management in the Cloud
Security Management Standards
Security Management in the Cloud
Availability Management
SaaS Availability Management
PaaS Availability Management
IaaS Availability Management
Access Control
Security Vulnerability, Patch, and Configuration Management
Summary
Chapter 7 Privacy
What Is Privacy?
What Is the Data Life Cycle?
What Are the Key Privacy Concerns in the Cloud?
Who Is Responsible for Protecting Privacy?
Changes to Privacy Risk Management and Compliance in Relation to
Cloud Computing
Legal and Regulatory Implications
U.S. Laws and Regulations
International Laws and Regulations
Summary
Chapter 8 Audit and Compliance
Internal Policy Compliance
Governance, Risk, and Compliance (GRC)
Illustrative Control Objectives for Cloud Computing
Incremental CSP-Specific Control Objectives
Additional Key Management Control Objectives
Control Considerations for CSP Users
Regulatory/External Compliance
Other Requirements
Cloud Security Alliance
Auditing the Cloud for Compliance
Summary
Chapter 9 Examples of Cloud Service Providers
Amazon Web Services (IaaS)
Google (SaaS, PaaS)
Microsoft Azure Services Platform (PaaS)
Proofpoint (SaaS, IaaS)
RightScale (IaaS)
Salesforce.com (SaaS, PaaS)
Sun Open Cloud Platform
Workday (SaaS)
Summary
Chapter 10 Security-As-a-[Cloud] Service
Origins
Today s Offerings
Summary
Chapter 11 The Impact of Cloud Computing on the
Role of Corporate IT
Why Cloud Computing Will Be Popular with Business Units
Potential Threats of Using CSPs
A Case Study Illustrating Potential Changes in the IT Profession
Caused by Cloud Computing
Governance Factors to Consider When Using Cloud Computing
Summary
Chapter 12 Conclusion, and the Future of the Cloud
Analyst Predictions
Survey Says?
Security in Cloud Computing
Program Guidance for CSP Customers
The Future of Security in Cloud Computing
Summary
Appendix SAS 70 Report Content Example
Section I: Service Auditor s Opinion
Section II: Description of Controls
Section III: Control Objectives, Related Controls, and Tests of Operating Effectiveness
Section IV: Additional Information Provided by the Service
Organization
Appendix SysTrust Report Content Example
SysTrust Auditor s OpinionAmerican Institute of Certified Public Accountants (AICPA),
Trust Services Principles, Criteria and Illustrations for Security,
Availability, Processing Integrity, Confidentiality, and Privacy
(Including WebTrust® and SysTrust®), 2006. Available at . [Trust Services
Principles]
SysTrust Management Assertion
SysTrust System Description
SysTrust Schedule of Controls
Appendix Open Security Architecture for Cloud
Computing
Legend
Description
Key Control Areas
Examples
Assumptions
Typical Challenges
Indications
Contraindications
Resistance Against Threats
References
Control Details
Glossar
Chapter 1 Introduction
Mind the Gap
The Evolution of Cloud Computing
Summary
Chapter 2 What Is Cloud Computing?
Cloud Computing Defined
The SPI Framework for Cloud Computing
The Traditional Software Model
The Cloud Services Delivery Model
Cloud Deployment Models
Key Drivers to Adopting the Cloud
The Impact of Cloud Computing on Users
Governance in the Cloud
Barriers to Cloud Computing Adoption in the Enterprise
Summary
Chapter 3 Infrastructure Security
Infrastructure Security: The Network Level
Infrastructure Security: The Host Level
Infrastructure Security: The Application Level
Summary
Chapter 4 Data Security and Storage
Aspects of Data Security
Data Security Mitigation
Provider Data and Its Security
Summary
Chapter 5 Identity and Access Management
Trust Boundaries and IAM
Why IAM?
IAM Challenges
IAM Definitions
IAM Architecture and Practice
Getting Ready for the Cloud
Relevant IAM Standards and Protocols for Cloud Services
IAM Practices in the Cloud
Cloud Authorization Management
Cloud Service Provider IAM Practice
Guidance
Summary
Chapter 6 Security Management in the Cloud
Security Management Standards
Security Management in the Cloud
Availability Management
SaaS Availability Management
PaaS Availability Management
IaaS Availability Management
Access Control
Security Vulnerability, Patch, and Configuration Management
Summary
Chapter 7 Privacy
What Is Privacy?
What Is the Data Life Cycle?
What Are the Key Privacy Concerns in the Cloud?
Who Is Responsible for Protecting Privacy?
Changes to Privacy Risk Management and Compliance in Relation to
Cloud Computing
Legal and Regulatory Implications
U.S. Laws and Regulations
International Laws and Regulations
Summary
Chapter 8 Audit and Compliance
Internal Policy Compliance
Governance, Risk, and Compliance (GRC)
Illustrative Control Objectives for Cloud Computing
Incremental CSP-Specific Control Objectives
Additional Key Management Control Objectives
Control Considerations for CSP Users
Regulatory/External Compliance
Other Requirements
Cloud Security Alliance
Auditing the Cloud for Compliance
Summary
Chapter 9 Examples of Cloud Service Providers
Amazon Web Services (IaaS)
Google (SaaS, PaaS)
Microsoft Azure Services Platform (PaaS)
Proofpoint (SaaS, IaaS)
RightScale (IaaS)
Salesforce.com (SaaS, PaaS)
Sun Open Cloud Platform
Workday (SaaS)
Summary
Chapter 10 Security-As-a-[Cloud] Service
Origins
Today s Offerings
Summary
Chapter 11 The Impact of Cloud Computing on the
Role of Corporate IT
Why Cloud Computing Will Be Popular with Business Units
Potential Threats of Using CSPs
A Case Study Illustrating Potential Changes in the IT Profession
Caused by Cloud Computing
Governance Factors to Consider When Using Cloud Computing
Summary
Chapter 12 Conclusion, and the Future of the Cloud
Analyst Predictions
Survey Says?
Security in Cloud Computing
Program Guidance for CSP Customers
The Future of Security in Cloud Computing
Summary
Appendix SAS 70 Report Content Example
Section I: Service Auditor s Opinion
Section II: Description of Controls
Section III: Control Objectives, Related Controls, and Tests of Operating Effectiveness
Section IV: Additional Information Provided by the Service
Organization
Appendix SysTrust Report Content Example
SysTrust Auditor s OpinionAmerican Institute of Certified Public Accountants (AICPA),
Trust Services Principles, Criteria and Illustrations for Security,
Availability, Processing Integrity, Confidentiality, and Privacy
(Including WebTrust® and SysTrust®), 2006. Available at . [Trust Services
Principles]
SysTrust Management Assertion
SysTrust System Description
SysTrust Schedule of Controls
Appendix Open Security Architecture for Cloud
Computing
Legend
Description
Key Control Areas
Examples
Assumptions
Typical Challenges
Indications
Contraindications
Resistance Against Threats
References
Control Details
Glossar