Securing Cloud Services A pragmatic approach to security architecture in the Cloud

This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Part 1 introduces Cloud Computing and describes the main service models (IaaS, PaaS and SaaS...

Full description

Saved in:
Bibliographic Details
Main Author Newcombe, Lee
Format eBook
LanguageEnglish
Published Ely IT Governance Publishing 2012
IT Governance Ltd
IT Governance Pub
Edition1
Subjects
Online AccessGet full text
ISBN9781849283960
1849283966
9781849283977
1849283974

Cover

Table of Contents:
  • Front Matter PREFACE ABOUT THE AUTHOR ACKNOWLEDGEMENTS Table of Contents CHAPTER 1:: INTRODUCTION TO CLOUD COMPUTING CHAPTER 2:: OVERVIEW OF EXISTING CLOUD TAXONOMIES AND MODELS CHAPTER 3:: THE SECURITY BALANCE CHAPTER 4:: SECURITY THREATS ASSOCIATED WITH CLOUD COMPUTING CHAPTER 5:: PRIVACY AND DATA SECURITY CONCERNS CHAPTER 6:: INTRODUCTION TO SECURITY ARCHITECTURE CHAPTER 7:: APPLICATION OF SECURITY ARCHITECTURE TO CLOUD COMPUTING CHAPTER 8:: SECURITY AND THE CLOUD CHAPTER 9:: SECURITY AND INFRASTRUCTURE AS A SERVICE CHAPTER 10:: SECURITY AND PLATFORM AS A SERVICE CHAPTER 11:: SECURITY AND SOFTWARE AS A SERVICE CHAPTER 12:: LOOKING AHEAD CHAPTER 13:: CONCLUSION AND SUMMARY APPENDIX A: ITG RESOURCES
  • Title Page Preface Table of Contents Part I. Introduction 1. Introduction to Cloud Computing 2. Overview of Existing Cloud Taxonomies and Models 3. The Security Balance 4. Security Threats Associated with Cloud Computing 5. Privacy and Data Security Concerns Part II. Pragmatic Cloud Security 6. Introduction to Security Architecture 7. Application of Security Architecture to Cloud Computing 8. Security and the Cloud 9. Security and Infrastructure as a Service 10. Security and Platform as a Service 11. Security and Software as a Service Part III. Conclusion 12. Looking Ahead 13. Conclusion and Summary Appendix A: SRM Security Service Assignments ITG Resources
  • Intro -- PREFACE -- ABOUT THE AUTHOR -- ACKNOWLEDGEMENTS -- CONTENTS -- Part One: Introduction -- CHAPTER 1: INTRODUCTION TO CLOUD COMPUTING -- CHAPTER 2: OVERVIEW OF EXISTING CLOUD TAXONOMIES AND MODELS -- Service models -- Deployment models -- Jericho Forum® Cloud Cube model -- CHAPTER 3: THE SECURITY BALANCE -- Security benefits -- Potential pitfalls -- CHAPTER 4: SECURITY THREATS ASSOCIATED WITH CLOUD COMPUTING -- Cloud provider staff -- Image/application providers -- Competitors -- Crackers/hackers -- Insiders -- Governments -- Transport agents -- Identity providers -- Attribute providers -- Cloud management brokers -- CHAPTER 5: PRIVACY AND DATA SECURITY CONCERNS -- Data protection issues -- Payment card industry issues -- Others -- Part Two: Pragmatic Cloud Security -- CHAPTER 6: INTRODUCTION TO SECURITY ARCHITECTURE -- What is security architecture? -- What is a service? -- Architectural layers -- Advantages of security architecture -- CHAPTER 7: APPLICATION OF SECURITY ARCHITECTURE TO CLOUD COMPUTING -- Security reference model -- Security service descriptions -- Service levels and contracts -- Service models and the security reference model -- Conclusions -- CHAPTER 8: SECURITY AND THE CLOUD -- Existing guidance -- Common security services -- Cloud deployment models -- CHAPTER 9: SECURITY AND INFRASTRUCTURE AS A SERVICE -- IaaS and the SRM -- Conclusion -- CHAPTER 10: SECURITY AND PLATFORM AS A SERVICE -- PaaS and the SRM -- Conclusion -- CHAPTER 11: SECURITY AND SOFTWARE AS A SERVICE -- Conclusion -- Part Three: Conclusion -- CHAPTER 12: LOOKING AHEAD -- Overview -- CHAPTER 13: CONCLUSION AND SUMMARY -- APPENDIX A: SRM SECURITY SERVICE ASSIGNMENTS -- ITG RESOURCES