- 威望
 - 58 
 - 金币
 - 27 
 - 贡献
 - 4 
 - 在线时间
 - 1 小时
 - 最后登录
 - 2018-5-18
 - 阅读权限
 - 20
 - 注册时间
 - 2017-4-10
 - 积分
 - 58
  
 
 
 
  
TA的每日心情  | 无聊 2017-4-10 22:03:45 | 
|---|
 
  签到天数: 1 天 连续签到: 1 天 [LV.1]初来乍到 - 金币
 - 27 
 - 贡献
 - 4 
 - 威望
 - 58 
 - 在线时间
 - 1 小时
 - 注册时间
 - 2017-4-10
 - 最后登录
 - 2018-5-18
 - 积分
 - 58
  
 | 
C O N T E N T S 
PREFACE xi 
1 INTRODUCTION 1 
“Mind the Gap” 1 
The Evolution of Cloud Computing 2 
Summary 5 
2 WHAT IS CLOUD COMPUTING? 7 
Cloud Computing Defined 7 
The SPI Framework for Cloud Computing 11 
The Traditional Software Model 17 
The Cloud Services Delivery Model 17 
Cloud Deployment Models 22 
Key Drivers to Adopting the Cloud 26 
The Impact of Cloud Computing on Users 27 
Governance in the Cloud 30 
Barriers to Cloud Computing Adoption in the Enterprise 30 
Summary 34 
3 INFRASTRUCTURE SECURITY 35 
Infrastructure Security: The Network Level 36 
Infrastructure Security: The Host Level 44 
Infrastructure Security: The Application Level 49 
Summary 59 
4 DATA SECURITY AND STORAGE 61 
Aspects of Data Security 61 
Data Security Mitigation 65 
Provider Data and Its Security 66 
Summary 71 
5 IDENTITY AND ACCESS MANAGEMENT 73 
Trust Boundaries and IAM 73 
Why IAM? 74 
IAM Challenges 76 
IAM Definitions 76 
IAM Architecture and Practice 77 
Getting Ready for the Cloud 80 
Relevant IAM Standards and Protocols for Cloud Services 82 
IAM Practices in the Cloud 92 
Cloud Authorization Management 98 
Cloud Service Provider IAM Practice 99 
Guidance 104 
Summary 107 
6 SECURITY MANAGEMENT IN THE CLOUD 109 
Security Management Standards 112 
Security Management in the Cloud 113 
Availability Management 115 
SaaS Availability Management 117 
PaaS Availability Management 120 
IaaS Availability Management 122 
Access Control 124 
Security Vulnerability, Patch, and Configuration Management 130 
Summary 141 
7 PRIVACY 145 
What Is Privacy? 146 
What Is the Data Life Cycle? 146 
What Are the Key Privacy Concerns in the Cloud? 149 
Who Is Responsible for Protecting Privacy? 150 
Changes to Privacy Risk Management and Compliance in Relation to Cloud Computing 151 
Legal and Regulatory Implications 155 
U.S. Laws and Regulations 155 
International Laws and Regulations 162 
Summary 164 
8 AUDIT AND COMPLIANCE 167 
Internal Policy Compliance 168 
Governance, Risk, and Compliance (GRC) 170 
Illustrative Control Objectives for Cloud Computing 174 
Incremental CSP-Specific Control Objectives 179 
Additional Key Management Control Objectives 180 
Control Considerations for CSP Users 181 
Regulatory/External Compliance 182 
Other Requirements 192 
Cloud Security Alliance 192 
Auditing the Cloud for Compliance 194 
Summary 202 
9 EXAMPLES OF CLOUD SERVICE PROVIDERS 203 
Amazon Web Services (IaaS) 203 
Google (SaaS, PaaS) 205 
Microsoft Azure Services Platform (PaaS) 206 
Proofpoint (SaaS, IaaS) 207 
RightScale (IaaS) 208 
Salesforce.com (SaaS, PaaS) 210 
Sun Open Cloud Platform 211 
Workday (SaaS) 213 
Summary 213 
10 SECURITY-AS-A-[CLOUD] SERVICE 217 
Origins 218 
Today’s Offerings 220 
Summary 223 
11 THE IMPACT OF CLOUD COMPUTING ON THE ROLE OF CORPORATE IT 225 
Why Cloud Computing Will Be Popular with Business Units 226 
Potential Threats of Using CSPs 228 
A Case Study Illustrating Potential Changes in the IT Profession Caused by Cloud Computing 230 
Governance Factors to Consider When Using Cloud Computing 235 
Summary 236 
12 CONCLUSION, AND THE FUTURE OF THE CLOUD 239 
Analyst Predictions 240 
Survey Says? 242 
Security in Cloud Computing 245 
Program Guidance for CSP Customers 257 
The Future of Security in Cloud Computing 260 
Summary 265 
A SAS 70 REPORT CONTENT EXAMPLE 267 
B SYSTRUST REPORT CONTENT EXAMPLE 273 
C OPEN SECURITY ARCHITECTURE FOR CLOUD COMPUTING 279 
GLOSSARY 293 
INDEX 299 
 
 |   
 
  
 |