Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 315 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
315
Dung lượng
3,27 MB
Nội dung
[...]... considerations for security when adopting thecloud model Chapter 6: Securingthe Cloud: Key Strategies and Best Practices Chapter 6 Securingthe Cloud: Key Strategies and Best Practices” presents an overall cloudsecurity strategy for effectively managing risk Also covered is a treatment of cloudsecurity controls and a discussion of the limits of security controls in cloud computing The chapter also... and Legal Aspects Chapter 3 Security Concerns, Risk Issues, and Legal Aspects” takes a closer look at thesecurity concerns and issues with clouds along with surveying the legal and regulatory considerations of different types of clouds Chapter 4: Securingthe Cloud: Architecture Chapter 4 Securingthe Cloud: Architecture” identifies a number of security requirements for cloud computing Proceeding... we refer to these as the SPI xxi xxii Introduction service model Developing guidelines entails a review and understanding of security principles, security risks, andsecurity architecture What we aim to do is to describe thesecurity issues associated with cloud computing and how to apply security to cloud computing We recognize that security requirements and solutions will vary greatly, and thus our... both cloud providers andcloud consumers From how we build IT systems and how we use them to how we organize and structure IT resources, cloud is refactoring the IT landscape Instead of uncrating computers and racking them in your server closet, thecloud allows for virtually downloading hardware and associated infrastructure By abstracting IT infrastructure and services to be relatively transparent, the. .. efficiently by a smaller staff per service increment then if you take the same computers and disperse them to many server rooms And there lies a further advantage for security Resource Elasticity Consumers of cloud resources can flex their use of computer resources (cycles, storage, bandwidth, and memory) as needed 7 8 CHAPTER 1 Introduction to Cloud Computing andSecurity • • Doing so with traditional approaches... common nature of these processes, the stand-alone era and even more so the PC launched the software industry As the software industry grew and alternative software packages arose, the cost of computing began to decrease The software industry has on the one hand brought powerful automation to anyone who could afford a computer, and on the other hand, we produced more and more software that was developed... for cloud security, discusses the major security considerations for building or selecting a cloud provider, and concludes with an examination of what it means to securely operate a cloud Chapter 1: Introduction to Cloud Computing andSecurity Chapter 1 “Introduction to Cloud Computing andSecurity presents an overview to cloud computing along with its IT foundations, the historical underpinnings, and. .. cabled and look the same Massive scale, a disciplined appearance, and repeated patterns are three qualities of successful cloud implementations These qualities are obviously not unique to the cloud, but they do contribute to the advantages of thecloud model And it isn’t simply the scale or the disciplined uniformity of a cloud infrastructure build: By developing appropriate repeated patterns and implementing... the NIST Cloud Computing Model, and identifies the essential characteristics of clouds Also covered is the SPI cloud service model (SaaS, PaaS, and IaaS) along with the four cloud delivery models (public, private, hybrid, and community) The chapter also covers the relative degree of security control a tenant or consumer has with the different models Chapter 3: Security Concerns, Risk Issues, and Legal... for cloudsecurityand a discussion of security monitoring for cloud computing Chapter 7: Security Criteria: Building an Internal Cloud Chapter 7 Security Criteria: Building an Internal Cloud discusses the various motivations for embarking on a private cloud strategy along with an overview of what adopting a private cloud strategy entails in terms of benefits to both the enterprise and to securityThe . y0 w0 h1" alt="" Securing the Cloud Cloud Computer Security Techniques and Tactics This page intentionally left blank Securing the Cloud Cloud Computer Security Techniques and Tactics Vic (J.R.). Securing the Cloud: Architecture 89 Security Requirement s for the Architecture. 91 Physical Security 91 Cloud Security Standards and Policies . . . . . . . . . . . . . . . . . . . 93 Cloud Security. mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility. To the fullest extent of the law, neither the Publisher nor the authors,