Cover image for Securing cloud and mobility : a practitioner's guide
Title:
Securing cloud and mobility : a practitioner's guide
Personal Author:
Publication Information:
FL, : Auerbach Publications, 2013.
Physical Description:
xvii, 210 p. : ill. ; 24 cm.
ISBN:
9781439850558

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010324817 QA76.585 L56 2013 Open Access Book Book
Searching...

On Order

Summary

Summary

Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, Securing Cloud and Mobility: A Practitioner's Guide explains how to secure the multifaceted layers of private and public cloud deployments as well as mobility infrastructures. With comprehensive coverage that includes network, server, and endpoint security, it provides a strategic view of the security implications of virtualization and cloud computing.

The book begins by deconstructing the terminology of cloud computing. It explains how to establish a secure framework within the virtualized environment and breaks down the various deployment and service models for cloud computing.

For private clouds, it discusses the issues of physical versus logical segmentation, securing orchestration, encryption services, threat intelligence, and identity management. For public clouds, it provides three frameworks for reviewing cloud services: cursory, in-depth, and outsourced.

On the mobility side, the text discusses the three major mobile architectures: Apple IOS, Android, and Blackberry. Filled with real-world examples, it addresses the various mobile management approaches, secure mobile code development and standards, and the emerging threats to both cloud and mobility.

Laying out decision-making frameworks to help you secure your virtual environment, the book includes coverage of physical and virtual segregation, orchestration security, threat intelligence, identity management, cloud security assessments, cloud encryption services, audit and compliance, certifications, and secure mobile architecture. It includes helpful implementation considerations, technical decision points, and process flows to supply you with practical guidance on how to navigate the undulating terrains of cloud and mobility.


Author Notes

Lim, Ian; Coolidge, E. Coleen ; Hourani, Paul


Table of Contents

List of Figuresp. xiii
List of Tablesp. xv
Part I Rethinking It and Security
Chapter 1 Tectonic Shiftsp. 3
1.2 Disruptive Forcesp. 3
1.2 Deconstructing Cloud Computingp. 3
1.2.1 NIST Definitionp. 3
1.2.2 The Three Service Modelsp. 4
1.2.3 The Four Deployment Modelsp. 6
1.3 The Rise of Mobilityp. 7
1.4 New ITp. 9
Referencesp. 10
Chapter 2 The Evolving Threat Landscapep. 11
2.1 From Cryptographers to World Leadersp. 11
2.2 The Changing Threat Landscapep. 12
2.3 Hacktivistsp. 14
2.3.1 Motivationp. 14
2.3.2 Modus Operandip. 15
2.3.3 Hacktivism and Cloudp. 16
2.3.4 Hacktivism and Mobilityp. 17
2.3.5 Hacktivism and Securityp. 17
2.4 Organized Cyber Crimep. 19
2.4.1 Motivationp. 19
2.4.2 Modus Operandip. 19
2.4.3 Organized Crime and Cloudp. 20
2.4.4 Organized Crime and Mobilityp. 22
2.4.5 Organized Crime and Securityp. 24
2.5 Cyber Espionage and Terrorismp. 25
2.5.1 Motivationp. 25
2.5.2 Modus Operandip. 26
2.5.3 Cyber Espionage, Terrorism, and Cloudp. 27
2.5.4 Cyber Espionage, Terrorism, and Mobilityp. 27
2.5.5 Cyber Espionage, Terrorism, and Securityp. 28
2.6 Hackers for Hirep. 29
2.6.1 Motivation and Modus Operandip. 29
2.6.2 Hackers for Hire and the Cloudp. 30
2.6.3 Hackers for Hire and Mobilityp. 30
2.6.4 Hackers for Hire and Securityp. 31
2.7 Insider Threatp. 32
Referencesp. 33
Part II Deconstructing Cloud Security
Chapter 3 Cloud Dialoguesp. 39
3.1 Point of Cloudp. 39
3.2 Capabilityp. 40
3.3 Financialsp. 41
3.4 Agilityp. 42
3.5 Securityp. 43
3.6 Licensingp. 46
3.7 Service Level Agreementsp. 49
Referencesp. 50
Part III Securing Private Cloud Computing
Chapter 4 Segmentation and the Private Cloudp. 53
4.1 Physical and Logical Segmentationp. 53
4.2 Physical Segmentationp. 54
4.3 Physical and Virtual Segmentationp. 56
4.4 Highly Optimized Segmentation Modelp. 58
4.5 Production-Based Segmentation Modelp. 60
4.6 Storage Segmentation Modelp. 60
Chapter 5 Orchestration and Cloud Managementp. 65
5.1 What Is Orchestration?p. 65
5.2 Benefits and Challengesp. 65
5.3 Information Security Considerationsp. 68
5.3.1 Secure Service Delivery Workflowsp. 69
5.3.2 Secure Resource Delivery Automationp. 69
5.3.3 Secure Orchestration Managementp. 72
5.3.4 Security Monitoringp. 72
Chapter 6 Encryption Servicesp. 75
6.1 Holistic Encryption Strategyp. 75
6.2 Scope Reductionp. 76
6.3 Transport Layer Encryptionp. 77
6.3.1 Secure Socket Layer (SSL)p. 77
6.3.2 Virtual Private Networks (VPNs)p. 77
6.3.3 Secure Shell (SSH)p. 78
6.3.4 Secure File Transfer Protocol (SFTP)p. 78
6.3.5 Transport Layer Security (TLS)p. 79
6.4 Data Layer Encryptionp. 79
6.4.1 Database Encryptionp. 80
6.4.2 Pile Encryptionp. 80
6.4.3 Encryption Appliancesp. 83
6.4.4 Disk Encryptionp. 84
6.4.5 Virtualization Encryptionp. 86
6.5 Key Management Life Cyclep. 88
Referencesp. 91
Chapter 7 Threat Intelligencep. 93
7.1 Security Threats to Private Cloudp. 93
7.2 Threat Prevention Strategiesp. 95
7.3 Threat Detection Toolsetp. 95
7.4 Making Threat Detection Intelligentp. 99
Chapter 8 Identity Management for Private Cloudsp. 103
8.1 Layers of Identitiesp. 103
8.2 Challenges of Disparate Identity Repositoriesp. 105
8.3 Centralizing Identity Repositoriesp. 106
8.3.1 Entitlements Aggregatorp. 106
8.3.2 Authoritative Sources of Identitiesp. 108
8.3.3 Administrative Accessp. 109
8.3.4 Task User Accessp. 109
8.3.5 Central Identity Repositoryp. 110
Part IV Securing Public Clouds
Chapter 9 Enterprise Cloud Governancep. 115
9.1 Security Exposure of Public Cloud Usep. 115
9.2 Corporate Cloud Use Policyp. 116
9.3 Cloud Request Formp. 118
9.4 Cloud Approval Workflowp. 120
Referencesp. 123
Chapter 10 Cursory Cloud Use Reviewp. 125
10.1 Overviewp. 125
10.2 Interview with Cloud Service Providerp. 126
10.3 Cursory Review-Assessment Reportp. 130
Chapter 11 In-Depth Cloud Assessmentp. 133
11.1 Overviewp. 133
11.2 Interview with the Requestorp. 134
11.3 Security Governancep. 136
11.4 Data Protectionp. 138
11.4.1 Overviewp. 138
11.4.2 Data Protection Questions for All Service Modelsp. 139
11.4.3 SaaS Data Protection Questionsp. 139
11.4.4 PaaS Data Protection Questionsp. 141
11.4.5 IaaS Data Protection Questionsp. 142
11.5 Security Architecturep. 142
11.6 Application Securityp. 144
11.6.1 Overviewp. 144
11.6.2 SaaS Application Securityp. 144
11.6.3 PaaS Application Securityp. 145
11.7 Identity and Access Managementp. 145
11.7.1 Overviewp. 145
11.7.2 Identity Access Management for CSP Staffp. 146
11.7.3 Identity and Access Management for CSP Customersp. 147
11.8 Compliancep. 149
11.9 Electronic Discoveryp. 151
11.10 Closing the Loopp. 152
Referencesp. 153
Chapter 12 Third-Party Cloud Assessmentp. 155
12.1 Overviewp. 155
12.2 Selecting an Assessorp. 156
12.3 Finalizing the SOWp. 156
12.4 Closing the Loopp. 158
Part V Securing Mobile
Chapter 13 Mobile Security Infrastructurep. 161
13.1 Overviewp. 161
13.2 BlackBerry® Enterprise Server Architecturep. 161
13.3 Exchange to Support iOS, Android™, and Windows® Phonep. 163
Referencesp. 165
Chapter 14 The Mobile Client Itselfp. 169
14.1 Overviewp. 169
14.2 Tablet and Smart Phone Security Issuesp. 169
14.3 Bring Your Own Device (BYOD)p. 170
14.4 Lack of Encryptionp. 172
14.5 Lack of Good Authentication and Password Controlsp. 173
14.6 Unaltered Mobile Appsp. 174
14.7 Saying No Is a Tricky Businessp. 175
14.8 Updating Mobile Standards and Searching for Solutionsp. 175
14.9 Performing Sanity Testingp. 177
14.10 Garnering Executive Support and the Big Winp. 179
Referencesp. 181
Chapter 15 Connecting to Enterprise and Third-Party Applications from Mobile Devicesp. 183
15.1 Overviewp. 183
15.2 Connecting to Exchangep. 183
15.3 Connecting via VPNp. 184
15.4 Connecting to Microsoft SharePoint® 2010 or Laterp. 186
15.5 Connecting to a Desktop or Serverp. 187
15.6 Connecting to File Sharesp. 189
15.7 Connecting to or Installing Third-Party Applicationsp. 190
Referencesp. 191
Chapter 16 Creating Secure Mobile Applicationsp. 193
16.1 Mobile Application Development in Your Organizationp. 193
16.2 Start with the Stakeholdersp. 194
16.3 Step through the Entire SDLCp. 196
16.4 Guidelines Regarding Enterprise App Store/Google® Playp. 200
16.4.1 Overview of Infrastructurep. 200
16.4.2 Overview of Environment Setup and General Controlsp. 200
16.4.3 A Note about Publishing Your Appsp. 201
16.4.3.1 Dealing with the Apple® App Storep. 201
16.4.3.2 Dealing with Android's Google Playp. 201
Referencesp. 201
Indexp. 203