Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Ben Halpert
Auditing Cloud Computing: A Security and Privacy Guide
Cover
Title Page
Copyright
Dedication
Preface
Chapter 1: Introduction to Cloud Computing
History
Defining Cloud Computing
Cloud Computing Services Layers
Roles in Cloud Computing
Cloud Computing Deployment Models
Challenges
In Summary
Chapter 2: Cloud-Based IT Audit Process
The Audit Process
Control Frameworks for the Cloud
Recommended Controls
Risk Management and Risk Assessment
In Summary
Chapter 3: Cloud-Based IT Governance
Governance in the Cloud
Governance
Implementing and Maintaining Governance for Cloud Computing
In Summary
Chapter 4: System and Infrastructure Lifecycle Management for the Cloud
Every Decision Involves Making a Tradeoff
What about Policy and Process Collisions?
The System and Management Lifecycle Onion
Mapping Control Methodologies onto the Cloud
Verifying Your Lifecycle Management
Risk Tolerance
Special Considerations for Cross-Cloud Deployments
The Cloud Provider's Perspective
In Summary
Chapter 5: Cloud-Based IT Service Delivery and Support
Beyond Mere Migration
Architected to Share, Securely
The Question of Location
Designed and Delivered for Trust
In Summary
Chapter 6: Protection and Privacy of Information Assets in the Cloud
The Three Usage Scenarios
What Is a Cloud? Establishing the Context—Defining Cloud Solutions and their Characteristics
The Cloud Security Continuum and a Cloud Security Reference Model
Cloud Characteristics, Data Classification, and Information Lifecycle Management
Regulatory and Compliance Implications
A Cloud Information Asset Protection and Privacy Playbook
In Summary
Chapter 7: Business Continuity and Disaster Recovery
Business Continuity Planning and Disaster Recovery Planning Overview
Augmenting Traditional Disaster Recovery with Cloud Services
Cloud Computing and Disaster Recovery: New Issues to Consider
In Summary
Chapter 8: Global Regulation and Cloud Computing
What is Regulation?
Why Do Regulations Occur?
The Real World—A Mixing Bowl
The Regulation Story
Effective Audit
Identifying Risk
In Summary
Chapter 9: Cloud Morphing: Shaping the Future of Cloud Computing Security and Audit
Where is the Data?
A Shift in Thinking
Cloud Morphing Strategies
Data in the Cloud
Cloud Storage
Cryptographic Protection of the Data
In Summary
Appendix: Cloud Computing Audit Checklist
About the Editor
About the Contributors
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Table of Contents
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset