ABSTRACT
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide.
Features
• Covers patching and configuration vulnerabilities of a cloud server
• Evaluates methods for data encryption and long-term storage in a cloud server
• Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations
John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA’s space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
TABLE OF CONTENTS
part I|70 pages
Introduction
part II|56 pages
Risk Analysis and Division of Responsibility
part III|108 pages
Securing the Cloud Infrastructure
part IV|34 pages
Operating System and Network Security
part V|140 pages
Meeting Compliance Requirements
chapter Chapter 20|16 pages
Managing Legal Compliance in the Cloud: Understanding Contractual and Personal Data Protection Requirements
chapter Chapter 26|14 pages
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems
chapter Chapter 27|8 pages
Assuring Compliance with Government Certification and Accreditation Regulations
chapter Chapter 28|14 pages
Government Certification, Accreditation, Regulations, and Compliance Risks
part VI|32 pages
Preparing for Disaster Recovery
part VII|58 pages
Advanced Cloud Computing Security