About the Book:
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide.
Table of Contents
Introduction Cloud Computing Essentials
Cloud Security Baselines
Software as a Service (SaaS)
Infrastructure as a Service (Iaas).
Risk Analysis and Division of Responsibility Managing Risks in the Cloud
Dividing Operational Responsibility and Visibility
Retaining Information Security Accountability
anaging User Authentication and Authorization
Negotiating Security Requirements with Vendors
Establishing a Service Level Agreement (SLA)
Securing the Cloud Infrastructure Securing the Platform
Restricting Network Access through Security Groups
Configuring Platform-Specific User Access Control
Integrating Cloud Authentication/Authorization Systems.
Compartmentalizing Access To Protect Data Confidentiality and Availability
Securing Data in Motion and Data at Rest
Identifying Your Security Perimeter
Operating System and Network Security Locking Down Cloud Servers
Scanning for and Patching Vulnerabilities
Controlling and Verifying Configuration Management
Meeting Compliance Requirements Managing Cloud Governance
Retaining Responsibility for the Accuracy of the Data
Verifying Integrity in Stored and Transmitted Data
Assuring Compliance with Government Certification and Accreditation Regulations
Following Standards for Auditing Information Systems
Preparing for Disaster Recovery Implementing a Plan to Sustain Availability
Distributing Data Across the Cloud to Ensure Availability and Performance
Addressing Data Portability and Interoperability for a Change in Cloud Providers
Exploiting the Cloud for Disaster Recovery Options