Securing Cloud Services : A Pragmatic Approach, Second Edition.

By: Newcombe, LeeMaterial type: TextTextSeries: JSTOR eBooksPublisher: Ely : IT Governance Ltd, 2020Edition: 2nd edDescription: 1 online resource (453 p.)ISBN: 9781787782068; 1787782069Subject(s): Cloud computing -- Security measures | Computer security | Web services -- Security measuresGenre/Form: Electronic books. | Electronic books.Additional physical formats: Print version:: Securing Cloud Services : A Pragmatic Approach, Second EditionDDC classification: 005.8 LOC classification: QA76.585 | .N49 2020Online resources: Click here to view this ebook.
Contents:
Cover -- Title -- Copyright -- Preface -- About the Author -- Acknowledgements -- Contents -- Part 1: Securing Cloud services -- setting the scene -- Introduction -- Chapter 1: Introduction to Cloud computing -- Cloud computing -- Chapter 2: Overview of existing Cloud taxonomies and models -- Service models -- Deployment models -- Hybrid Cloud -- Chapter 3: The security balance -- Security benefits -- Data centre security -- Improved resilience -- Improved security patching -- Automation and DevSecOps -- Security expertise -- Knowledge sharing and situational awareness
Improved information sharing mechanisms -- Renewal of security architecture and segmentation -- Potential pitfalls -- Availability -- Shadow IT -- Information leakage -- Lock-in -- Multi-tenancy -- Visibility -- Inflexible and/or inadequate terms and conditions -- Chapter 4: Security threats associated with Cloud computing -- Cloud provider staff -- Image/application providers -- Equipment manufacturers -- Competitors -- Crackers/hackers -- Insiders -- Governments -- Transport agents -- Identity providers -- Attribute providers -- Cloud brokers -- Chapter 5: Privacy and regulatory concerns
Data protection issues -- Payment card industry issues -- Financial services and the Cloud -- Others -- Part 2: Securing Cloud services -- in practice -- Introduction -- Chapter 6: Introduction to security architecture -- What is security architecture? -- What is a service? -- Architectural layers -- Advantages of security architecture -- Chapter 7: Application of security architecture to cloud computing -- Security Reference Model -- Security service descriptions -- Service levels and contracts -- Service models and the Security Reference Model -- IaaS -- PaaS -- FaaS -- SaaS -- Conclusion
Chapter 8: Security and the Cloud -- Existing guidance -- Common security services -- Hosting -- Compliance -- Security governance -- Cloud deployment models -- Chapter 9: Security and Infrastructure as a Service -- IaaS and the SRM -- Conclusion -- Chapter 10: Security and Platform as a Service -- PaaS and the SRM -- Chapter 11: Security and Software as a Service -- Chapter 12: Security and Function as a Service -- Part 3: Conclusion -- Introduction -- Chapter 13: Looking ahead -- Overview -- Enterprise perspective -- Cyber security perspective -- Chapter 14: Conclusion and summary
Appendix A: SRM security service assignments -- Further reading
Summary: Securing Cloud Services - A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Manage the risks associated with Cloud computing - buy this book today!
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.585 .N49 2020 (Browse shelf) https://ezproxy.uttyler.edu/login?url=https://www.jstor.org/stable/10.2307/j.ctvwcjj1n Available on1151189441

Description based upon print version of record.

Cover -- Title -- Copyright -- Preface -- About the Author -- Acknowledgements -- Contents -- Part 1: Securing Cloud services -- setting the scene -- Introduction -- Chapter 1: Introduction to Cloud computing -- Cloud computing -- Chapter 2: Overview of existing Cloud taxonomies and models -- Service models -- Deployment models -- Hybrid Cloud -- Chapter 3: The security balance -- Security benefits -- Data centre security -- Improved resilience -- Improved security patching -- Automation and DevSecOps -- Security expertise -- Knowledge sharing and situational awareness

Improved information sharing mechanisms -- Renewal of security architecture and segmentation -- Potential pitfalls -- Availability -- Shadow IT -- Information leakage -- Lock-in -- Multi-tenancy -- Visibility -- Inflexible and/or inadequate terms and conditions -- Chapter 4: Security threats associated with Cloud computing -- Cloud provider staff -- Image/application providers -- Equipment manufacturers -- Competitors -- Crackers/hackers -- Insiders -- Governments -- Transport agents -- Identity providers -- Attribute providers -- Cloud brokers -- Chapter 5: Privacy and regulatory concerns

Data protection issues -- Payment card industry issues -- Financial services and the Cloud -- Others -- Part 2: Securing Cloud services -- in practice -- Introduction -- Chapter 6: Introduction to security architecture -- What is security architecture? -- What is a service? -- Architectural layers -- Advantages of security architecture -- Chapter 7: Application of security architecture to cloud computing -- Security Reference Model -- Security service descriptions -- Service levels and contracts -- Service models and the Security Reference Model -- IaaS -- PaaS -- FaaS -- SaaS -- Conclusion

Chapter 8: Security and the Cloud -- Existing guidance -- Common security services -- Hosting -- Compliance -- Security governance -- Cloud deployment models -- Chapter 9: Security and Infrastructure as a Service -- IaaS and the SRM -- Conclusion -- Chapter 10: Security and Platform as a Service -- PaaS and the SRM -- Chapter 11: Security and Software as a Service -- Chapter 12: Security and Function as a Service -- Part 3: Conclusion -- Introduction -- Chapter 13: Looking ahead -- Overview -- Enterprise perspective -- Cyber security perspective -- Chapter 14: Conclusion and summary

Appendix A: SRM security service assignments -- Further reading

Securing Cloud Services - A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Manage the risks associated with Cloud computing - buy this book today!

There are no comments on this title.

to post a comment.