E-Book, Englisch, 236 Seiten
Samani / Honan / Reavis CSA Guide to Cloud Computing
1. Auflage 2014
ISBN: 978-0-12-420185-9
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Implementing Cloud Privacy and Security
E-Book, Englisch, 236 Seiten
ISBN: 978-0-12-420185-9
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Raj Samani is an active member of the Information Security industry, through involvement with numerous initiatives to improve the awareness and application of security in business and society. He is currently working as the VP, Chief Technical Officer for McAfee EMEA, having previously worked as the Chief Information Security Officer for a large public sector organisation in the UK and was recently inducted into the Infosecurity Europe Hall of Fame (2012).He previously worked across numerous public sector organisations, in many cyber security and research orientated working groups across Europe. Examples include the midata Interoperability Board, as well as representing DIGITALEUROPE on the Smart Grids Reference Group established by the European Commission in support of the Smart Grid Mandate.In addition, Raj is currently the Cloud Security Alliance's Strategic Advisor for EMEA having previously served as the Vice President for Communications in the ISSA UK Chapter where he presided over the award of Chapter Communications Programme of the Year 2008 and 2009, having previously established the UK mentoring programme. He is also on the advisory council for the Infosecurity Europe show, Infosecurity Magazine, and expert on both searchsecurity.co.uk, and Infosec portal, and regular columnist on Computer Weekly. He has had numerous security papers published, and appeared on television (ITV and More4) commenting on computer security issues. He has also provided assistance in the 2006 RSA Wireless Security Survey and part of the consultation committee for the RIPA Bill (Part 3).
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;CSA Guide to Cloud: Computing Implementing Cloud Privacy and Security;4
3;Copyright;5
4;Contents;6
5;Forewords;8
5.1;Partner, Ridge Schmidt Cyber,;9
6;About the Authors;12
6.1;RAJ SAMANI;12
6.2;BRIAN HONAN;12
6.3;JIM REAVIS;13
7;About the Cloud Security Alliance;14
7.1;HISTORY;14
8;Acknowledgments;16
9;CSA Guide to Cloud Computing—Introduction;18
9.1;HOW THIS BOOK IS STRUCTURED;19
10;Chapter 1 - Cloud Computing, What is it and What’s the Big Deal?;22
10.1;DEFINING CLOUD COMPUTING;23
10.2;ECONOMIC OPPORTUNITIES FOR CLOUD COMPUTING;30
10.3;THE CLOUD IS “NOT” SECURE;40
10.4;END NOTES;41
11;Chapter 2 - Selecting and Engaging with a Cloud Service Provider;44
11.1;SECURITY, TRUST AND ASSURANCE REPOSITORY INITIATIVE;46
11.2;ENGAGING WITH THE CLOUD SERVICE PROVIDER;50
11.3;END NOTES;54
12;Chapter 3 - The Cloud Threat Landscape;56
12.1;THE CLOUD THREAT LANDSCAPE;57
12.2;NOTORIOUS NINE;60
12.3;ADDITIONAL CLOUD THREATS;79
12.4;END NOTES;80
13;Chapter 4 - Secure Cloud for Mobile Computing;84
13.1;MOBILE TOP THREATS: EVIL 8.0;85
13.2;ADDRESSING THE THREAT: MOBILE COMPONENTS;97
13.3;END NOTES;103
14;Chapter 5 - Making the Move into the Cloud;106
14.1;CLOUD COMPUTING CHECKLIST;108
14.2;SECURITY FOR THE CLOUD;116
14.3;END NOTES;136
15;Chapter 6 - Certification for Cloud Service Providers;138
15.1;Certification for Cloud Service Providers;138
15.2;END NOTES;156
16;Chapter 7 - The Privacy Imperative;158
16.1;DOES CLOUD COMPUTING MAKE MY DATA ANY LESS PRIVATE?;158
16.2;PRIVACY LEVEL AGREEMENT;161
16.3;DATA PROTECTION CERTIFICATION;167
16.4;END NOTES;169
17;Chapter 8 - Cloud Security Alliance Research;170
17.1;BIG DATA WORKING GROUP;171
17.2;CLOUD DATA GOVERNANCE;177
17.3;CLOUDCERT;179
17.4;CLOUDTRUST PROTOCOL;179
17.5;ENTERPRISE ARCHITECTURE WORKING GROUP;182
17.6;INCIDENT MANAGEMENT AND FORENSICS;182
17.7;INNOVATION INITIATIVE;183
17.8;SECURITY AS A SERVICE;183
17.9;SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS;186
17.10;SOFTWARE DEFINED PERIMETER;187
17.11;END NOTES;189
18;Chapter 9 - Dark Clouds, What to Do In The Event of a Security Incident;192
18.1;BUILDING A SECURITY INCIDENT RESPONSE TEAM;193
18.2;INCIDENT RESPONSE CHALLENGES IN THE CLOUD;197
18.3;THE FUTURE;210
18.4;END NOTES;211
19;Chapter 10 - The Future Cloud;212
19.1;MORE, MORE, AND MORE;212
19.2;CLOUD COMPUTING FOR CRITICAL INFRASTRUCTURE;214
19.3;DEFINING THE SECURITY REQUIREMENTS FOR TOMORROW’S CLOUD;218
19.4;END NOTES;228
20;Appendix;230
20.1;AUTHENTICATION BYPASS;230
21;Index;234
Selecting and Engaging with a Cloud Service Provider
Abstract
Selecting a cloud service provider will need to consider a number of key criteria, price being only one of these. This chapter will consider the available mechanisms to measure the security deployed by prospective providers.
Keywords
Assessment; Continuous monitoring; STAR initiative; Service level agreement
We have received a number of requests from customers seeking to gain access to their data immediately. Unfortunately, the levels of data held in the companies’ datacentres are such that this process could take up to 16weeks and we will need to ensure that the integrity of third-party data and security is maintained.




