ABSTRACT

This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of the leading experts on the state of cloud computing security and its future. It also provides no-nonsense info on cloud security technologies and models.

Securing the Cloud: Security Strategies for the Ubiquitous Data Center takes the position that cloud security is an extension of recognized, established security principles into cloud-based deployments. It explores how those principles can be put into practice to protect cloud-based infrastructure and data, traditional infrastructure, and hybrid architectures combining cloud and on-premises infrastructure.

Cloud computing is evolving so rapidly that regulations and technology have not necessarily been able to keep pace. IT professionals are frequently left to force fit pre-existing solutions onto new infrastructure and architectures for which they may be very poor fits. This book looks at how those "square peg/round hole" solutions are implemented and explains ways in which the pegs, the holes, or both may be adjusted for a more perfect fit.

chapter Chapter 1|14 pages

Introduction

chapter Chapter 2|12 pages

We Need a New Model for Security

chapter Chapter 3|10 pages

The Basics of IT Security: From Mainframe to Cloud

chapter Chapter 4|11 pages

The Basics of Security Failure

chapter Chapter 5|13 pages

The Basics of Fitting Security to Situation

chapter Chapter 6|10 pages

Defining the Cloud to Protect

chapter Chapter 7|12 pages

Infrastructure as a Service

chapter Chapter 8|9 pages

Platform as a Service (PaaS)

chapter Chapter 9|10 pages

Software as a Service

chapter Chapter 10|16 pages

Virtual Desktop Infrastructure

chapter Chapter 11|8 pages

Understand Your Cloud Type

chapter Chapter 12|10 pages

Public Cloud

chapter Chapter 13|11 pages

Private Cloud

chapter Chapter 14|11 pages

Hybrid Cloud

chapter Chapter 15|11 pages

Working with Your Cloud Provider

chapter Chapter 16|12 pages

Protecting the Perimeter

chapter Chapter 17|9 pages

Protecting the Contents

chapter Chapter 18|13 pages

Protecting the Infrastructure

chapter Chapter 19|10 pages

Tie the Cloud Using an Internal Management Framework

chapter Chapter 20|6 pages

Closing Comments