CONTENTS

Part 1: Securing Cloud services – setting the scene

Introduction

Chapter 1: Introduction to Cloud computing

Cloud computing

Chapter 2: Overview of existing Cloud taxonomies and models

Service models

Deployment models

Hybrid Cloud

Chapter 3: The security balance

Security benefits

Data centre security

Improved resilience

Improved security patching

Automation and DevSecOps

Security expertise

Knowledge sharing and situational awareness

Improved information sharing mechanisms

Renewal of security architecture and segmentation

Potential pitfalls

Availability

Shadow IT

Information leakage

Lock-in

Multi-tenancy

Visibility

Inflexible and/or inadequate terms and conditions

Chapter 4: Security threats associated with Cloud computing

Cloud provider staff

Image/application providers

Equipment manufacturers

Competitors

Crackers/hackers

Insiders

Governments

Transport agents

Identity providers

Attribute providers

Cloud brokers

Chapter 5: Privacy and regulatory concerns

Data protection issues

Payment card industry issues

Financial services and the Cloud

Others

Part 2: Securing Cloud services – in practice

Introduction

Chapter 6: Introduction to security architecture

What is security architecture?

What is a service?

Architectural layers

Advantages of security architecture

Chapter 7: Application of security architecture to cloud computing

Security Reference Model

Security service descriptions

Service levels and contracts

Service models and the Security Reference Model

IaaS

PaaS

FaaS

SaaS

Conclusion

Chapter 8: Security and the Cloud

Existing guidance

Common security services

Hosting

Compliance

Security governance

Cloud deployment models

Chapter 9: Security and Infrastructure as a Service

IaaS and the SRM

Conclusion

Chapter 10: Security and Platform as a Service

PaaS and the SRM

Chapter 11: Security and Software as a Service

Chapter 12: Security and Function as a Service

Part 3: Conclusion

Introduction

Chapter 13: Looking ahead

Overview

Enterprise perspective

Cyber security perspective

Chapter 14: Conclusion and summary

Appendix A: SRM security service assignments

Further reading

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.139.238.226