0%

Book Description

Securing Cloud Services – A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Manage the risks associated with Cloud computing.

Table of Contents

  1. Cover
  2. Title
  3. Copyright
  4. Preface
  5. About the Author
  6. Acknowledgements
  7. Contents
  8. Part 1: Securing Cloud services – setting the scene
    1. Introduction
    2. Chapter 1: Introduction to Cloud computing
      1. Cloud computing
    3. Chapter 2: Overview of existing Cloud taxonomies and models
      1. Service models
      2. Deployment models
      3. Hybrid Cloud
    4. Chapter 3: The security balance
      1. Security benefits
      2. Data centre security
      3. Improved resilience
      4. Improved security patching
      5. Automation and DevSecOps
      6. Security expertise
      7. Knowledge sharing and situational awareness
      8. Improved information sharing mechanisms
      9. Renewal of security architecture and segmentation
      10. Potential pitfalls
      11. Availability
      12. Shadow IT
      13. Information leakage
      14. Lock-in
      15. Multi-tenancy
      16. Visibility
      17. Inflexible and/or inadequate terms and conditions
    5. Chapter 4: Security threats associated with Cloud computing
      1. Cloud provider staff
      2. Image/application providers
      3. Equipment manufacturers
      4. Competitors
      5. Crackers/hackers
      6. Insiders
      7. Governments
      8. Transport agents
      9. Identity providers
      10. Attribute providers
      11. Cloud brokers
    6. Chapter 5: Privacy and regulatory concerns
      1. Data protection issues
      2. Payment card industry issues
      3. Financial services and the Cloud
      4. Others
  9. Part 2: Securing Cloud services – in practice
    1. Introduction
    2. Chapter 6: Introduction to security architecture
      1. What is security architecture?
      2. What is a service?
      3. Architectural layers
      4. Advantages of security architecture
    3. Chapter 7: Application of security architecture to cloud computing
      1. Security Reference Model
      2. Security service descriptions
      3. Service levels and contracts
      4. Service models and the Security Reference Model
      5. IaaS
      6. PaaS
      7. FaaS
      8. SaaS
      9. Conclusion
    4. Chapter 8: Security and the Cloud
      1. Existing guidance
      2. Common security services
      3. Hosting
      4. Compliance
      5. Security governance
      6. Cloud deployment models
    5. Chapter 9: Security and Infrastructure as a Service
      1. IaaS and the SRM
      2. Conclusion
    6. Chapter 10: Security and Platform as a Service
      1. PaaS and the SRM
    7. Chapter 11: Security and Software as a Service
    8. Chapter 12: Security and Function as a Service
  10. Part 3: Conclusion
    1. Introduction
    2. Chapter 13: Looking ahead
      1. Overview
      2. Enterprise perspective
      3. Cyber security perspective
    3. Chapter 14: Conclusion and summary
  11. Appendix A: SRM security service assignments
  12. Further reading
18.118.164.121