Cloud Computing: Assessing the risks provides an up-to-date, clear, concise and comprehensive guide to Cloud Computing, giving invaluable insights to the various risks and challenges associated with the Cloud.
Cover
Title
Copyright
Foreword
About the Authors
Acknowledgements
Contents
Chapter 1: Cloud Computing Explained
The potential of Cloud Computing
Cloud Computing defined
Key characteristics of Cloud Computing
Characteristic One: On-demand self-service
Characteristic Two: Broad network access
Characteristic Three: Resource pooling
Characteristic Four: Rapid elasticity
Characteristic Five: Measured service
Summary of Cloud Computing characteristics
Cloud Computing definition summary
What The New York Times tells us about Cloud Computing
Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance
Relationship between security, compliance and risk
Governance, compliance and risk in a Cloud environment
Security in a Cloud Computing environment
Conclusion
Chapter 3: Governance of Cloud Computing
Which governance framework is right for Cloud?
Role of the service catalogue
Dude, where’s my server? (The need for policy management)
Conclusion
Chapter 4: Cloud Computing Top Security Risks
Security – the shift from static to dynamic
Breakdown of security assumptions
Conclusion
Chapter 5: Assessing Security in the Cloud
Assessing Cloud security
Peeking below the trust boundary
The challenge of evaluation
Role of certification
Certifications and audits
Mapping the CAI and CCM to the security stack
Conclusion
Chapter 6: Cloud Computing Application Security
Identity management and role-based access controls
Network security
Data security
Instance security
Application architecture and deployment topology
Code update and patch management
Conclusion
Chapter 7: Organisational Risks Associated with Cloud Computing
Organisational risks of Cloud Computing
Cloud Computing does and doesn’t change everything
Impact of Cloud Computing on executive decision-making roles
Impact of Cloud Computing on traditional IT roles
Instituting DevOps
Developing for a multi-tenant universe
The runaway train: Cloud sprawl
Delivering IT-as-a-Service
Chapter 8: Business Continuity and Disaster Recovery in Cloud Computing
Business continuity overview
Disaster recovery overview
Differences between Cloud vs. traditional BC and DR
SaaS business continuity challenges
PaaS business continuity challenges
IaaS business continuity challenges
Possible benefits
Possible issues and challenges
Important considerations
What to ask your Cloud provider
Cloud-based BC and DR offerings
Restructuring plans and procedures
Testing and walkthrough of updated plans
Recent business continuity/disaster recovery case study
Chapter 9: Investigations and Forensics in the Cloud
Forensics overview
Forensics: what has changed?
Who conducts these investigations?
Forensic procedures and requirements
Forensic investigations vs. analysis
Traditional forensics vs. Cloud forensics
Data in transit
Encryption and investigations
Custom Cloud APIs
Cloud solution forensic tools
In summary
Chapter 10: Cloud Computing Borders – National and International Deployment 244
Cloud Computing: Assessing the risks provides an up-to-date, clear, concise and comprehensive guide to Cloud Computing, giving invaluable insights to the various risks and challenges associated with the Cloud.
Table of contents
Cover
Title
Copyright
Foreword
About the Authors
Acknowledgements
Contents
Chapter 1: Cloud Computing Explained
The potential of Cloud Computing
Cloud Computing defined
Key characteristics of Cloud Computing
Characteristic One: On-demand self-service
Characteristic Two: Broad network access
Characteristic Three: Resource pooling
Characteristic Four: Rapid elasticity
Characteristic Five: Measured service
Summary of Cloud Computing characteristics
Cloud Computing definition summary
What The New York Times tells us about Cloud Computing
Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance
Relationship between security, compliance and risk
Governance, compliance and risk in a Cloud environment
Security in a Cloud Computing environment
Conclusion
Chapter 3: Governance of Cloud Computing
Which governance framework is right for Cloud?
Role of the service catalogue
Dude, where’s my server? (The need for policy management)
Conclusion
Chapter 4: Cloud Computing Top Security Risks
Security – the shift from static to dynamic
Breakdown of security assumptions
Conclusion
Chapter 5: Assessing Security in the Cloud
Assessing Cloud security
Peeking below the trust boundary
The challenge of evaluation
Role of certification
Certifications and audits
Mapping the CAI and CCM to the security stack
Conclusion
Chapter 6: Cloud Computing Application Security
Identity management and role-based access controls
Network security
Data security
Instance security
Application architecture and deployment topology
Code update and patch management
Conclusion
Chapter 7: Organisational Risks Associated with Cloud Computing
Organisational risks of Cloud Computing
Cloud Computing does and doesn’t change everything
Impact of Cloud Computing on executive decision-making roles
Impact of Cloud Computing on traditional IT roles
Instituting DevOps
Developing for a multi-tenant universe
The runaway train: Cloud sprawl
Delivering IT-as-a-Service
Chapter 8: Business Continuity and Disaster Recovery in Cloud Computing
Business continuity overview
Disaster recovery overview
Differences between Cloud vs. traditional BC and DR
SaaS business continuity challenges
PaaS business continuity challenges
IaaS business continuity challenges
Possible benefits
Possible issues and challenges
Important considerations
What to ask your Cloud provider
Cloud-based BC and DR offerings
Restructuring plans and procedures
Testing and walkthrough of updated plans
Recent business continuity/disaster recovery case study
Chapter 9: Investigations and Forensics in the Cloud
Forensics overview
Forensics: what has changed?
Who conducts these investigations?
Forensic procedures and requirements
Forensic investigations vs. analysis
Traditional forensics vs. Cloud forensics
Data in transit
Encryption and investigations
Custom Cloud APIs
Cloud solution forensic tools
In summary
Chapter 10: Cloud Computing Borders – National and International Deployment 244