Skip to:Content
|
Bottom
Cover image for CSA guide to cloud computing : implementing cloud privacy and security
Title:
CSA guide to cloud computing : implementing cloud privacy and security
Personal Author:
Publication Information:
Amsterdam ; Boston : Elsevier/Syngress, an imprint of Elsevier, 2015
Physical Description:
xx, 216 pages : illustrations ; 24 cm.
ISBN:
9780124201255
General Note:
Includes index.
Added Corporate Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010344208 QA76.585 S26 2015 Open Access Book Book
Searching...

On Order

Summary

Summary

CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA).

For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents.

The authors of CSA Guide to Cloud Computing provide a wealth of industry expertise you won't find anywhere else. Author Raj Samani is the Chief Technical Officer for McAfee EMEA; author Jim Reavis is the Executive Director of CSA; and author Brian Honan is recognized as an industry leader in the ISO27001 standard. They will walk you through everything you need to understand to implement a secure cloud computing structure for your enterprise or organization.


Author Notes

Raj Samani, EMEA CTO McAfee part of Intel Security Brian Honan (CISM, CRISC, CCEIT), CEO BH Consulting.
Jim Reals, Co-founder and Chief Executive Officer for the Cloud Security Alliance.


Table of Contents

Forewordsp. vii
About the Authorsp. xi
About the Cloud Security Alliancep. xiii
Acknowledgmentsp. xv
CSA Guide to Cloud Computing-Introductionp. xvii
Chapter 1 Cloud Computing, What is it and What's the Big Deal?p. 1
Defining Cloud Computingp. 2
Economic Opportunities for Cloud Computingp. 9
The Cloud Is "Not" Securep. 19
End Notesp. 20
Chapter 2 Selecting and Engaging with a Cloud Service Providerp. 23
Security, Trust and Assurance Repository Initiativep. 25
Engaging with the Cloud Service Providerp. 29
End Notesp. 33
Chapter 3 The Cloud Threat Landscapep. 35
The Cloud Threat Landscapep. 36
Notorious Ninep. 39
Additional Cloud Threatsp. 58
End Notesp. 59
Chapter 4 Secure Cloud for Mobile Computingp. 63
Mobile Top Threats: Evil 8.0p. 64
Addressing the Threat; Mobile Components for Considerationp. 76
End Notesp. 82
Chapter 5 Making the Move into the Cloudp. 85
Cloud Computing Checklistp. 87
Security for the Cloudp. 95
End Notesp. 115
Chapter 6 Certification for Cloud Service Providersp. 117
Certification for Cloud Service Providersp. 117
End Notesp. 135
Chapter 7 The Privacy Imperativep. 137
Does Cloud Computing Make My Data Any Less Private?p. 137
Privacy Level Agreementp. 140
Data Protection Certificationp. 146
End Notesp. 148
Chapter 8 Cloud Security Alliance Researchp. 149
Big Data Working Groupp. 150
Cloud Data Governancep. 156
CloudCERTp. 158
CloudTrust Protocolp. 158
Enterprise Architecture Working Groupp. 161
Incident Management and Forensicsp. 161
Innovation Initiativep. 162
Security as a Servicep. 162
Security Guidance for Critical Areas of Focus in Cloud Computingp. 165
Software Defined Perimeterp. 166
End Notesp. 168
Chapter 9 Dark Clouds, What to Do In The Event of a Security Incidentp. 171
Building a Security Incident Response Teamp. 172
Incident Response Challenges in the Cloudp. 176
The Futurep. 189
End Notesp. 190
Chapter 10 The Future Cloudp. 191
More, More, and Morep. 191
Cloud Computing for Critical Infrastructurep. 193
Defining the Security Requirements for Tomorrow's Cloudp. 197
End Notesp. 207
Appendixp. 209
Indexp. 213
Go to:Top of Page