Share
Fr. 86.00
Ben Halpert, Halpert Ben
Auditing Cloud Computing - A Security and Privacy Guide
English · Hardback
Shipping usually within 1 to 3 weeks (not available at short notice)
Description
Informationen zum Autor BEN HALPERT, CISSP, is an information security researcher and practitioner. He has keynoted and presented sessions at numerous conferences and was a contributing author to Readings and Cases in the Management of Information Security and the Encyclopedia of Information Ethics and Security . Halpert writes a monthly security column for Mobile Enterprise magazine as well as an IT blog (www.benhalpert.com). He is also an adjunct instructor and on the advisory board of numerous colleges and universities. Klappentext AUDITING CLOUD COMPUTING A Security and Privacy Guide Companies are increasingly looking to Cloud Computing to improve operational efficiency, reduce head counts, and help with the bottom line. But security and privacy concerns present a strong barrier to entry. In an age when the consequences and potential costs of mistakes could quickly become catastrophic for companies that handle confidential and private customer data, auditors and IT security professionals must develop better ways of evaluating the security and privacy practices of Cloud services. Auditing Cloud Computing presents a collection of white papers written by renowned thought leaders in the field of auditing Cloud Computing to show you how to audit your company's hosted services. Providing a holistic view to this elastic, on-demand service, Auditing Cloud Computing is your one-stop reference to Cloud Computing and the many questions that may arise during preparation of an audit program or throughout the course of an audit or assessment. Edited by renowned information security researcher and practitioner Ben Halpert, this volume gathers a team of prominent Cloud experts who have labored to provide insight into many aspects that you and your organization will encounter during your foray into the Cloud. Written for Cloud consumers, providers, and integrators, Auditing Cloud Computing explores: The history, relevant definitions, deployment models, and challenges of Cloud computing What you can expect when creating audit programs for Cloud environments How the industry efforts of CSA, NIST, ISACA, and ENISA have influenced security and compliance programs Implementing, extending, and maintaining a governance program for Cloud activities How to leverage existing lifecycle controls Cross-cloud deployments Cloud-based IT delivery and support How "radical simplification" and "securely shared" concepts apply to all Cloud deployment models, even private Clouds Architecture considerations for Cloud service delivery and support The Cloud security continuum Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) Regulations along with Cloud-specific considerations Shaping the future of Cloud Computing security and audit Learn how to conduct a proper audit to ensure the security and privacy of your company's data in the Cloud with the necessary guidance found in Auditing Cloud Computing. Zusammenfassung The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations are reporting or projecting a significant cost savings through the use of cloud computing utilizing shared computing resources to provide ubiquitous access for organizations and end users. Inhaltsverzeichnis Preface xiii Chapter 1: Introduction to Cloud Computing 1 History 1 Defining Cloud Computing 2 Elasticity 2 Multitenancy 3 Economics 3 Abstraction 3 Cloud Computing Services Layers 4 Infrastructure as a Service 5 Platform as a Service 5 Software as a Service 6 Roles in Cloud Computing 6 Consumer 6 Provider 6 Integrator 7 Cloud Computing Deployment Models 8 Private 8 Community 8 Public 9 Hybrid 9 Challenges 9 Availability 10 ...
List of contents
Preface xiii
Chapter 1: Introduction to Cloud Computing 1
History 1
Defining Cloud Computing 2
Elasticity 2
Multitenancy 3
Economics 3
Abstraction 3
Cloud Computing Services Layers 4
Infrastructure as a Service 5
Platform as a Service 5
Software as a Service 6
Roles in Cloud Computing 6
Consumer 6
Provider 6
Integrator 7
Cloud Computing Deployment Models 8
Private 8
Community 8
Public 9
Hybrid 9
Challenges 9
Availability 10
Data Residency 10
Multitenancy 11
Performance 11
Data Evacuation 12
Supervisory Access 12
In Summary 13
Chapter 2: Cloud-Based IT Audit Process 15
The Audit Process 16
Control Frameworks for the Cloud 18
ENISA Cloud Risk Assessment 20
FedRAMP 20
Entities Using COBIT 21
CSA Guidance 21
CloudAudit/A6--The Automated Audit, Assertion, Assessment, and Assurance API 22
Recommended Controls 22
Risk Management and Risk Assessment 26
Risk Management 27
Risk Assessment 27
Legal 28
In Summary 29
Chapter 3: Cloud-Based IT Governance 33
Governance in the Cloud 36
Understanding the Cloud 36
Security Issues in the Cloud 37
Abuse and Nefarious Use of Cloud Computing 38
Insecure Application Programming Interfaces 39
Malicious Insiders 39
Shared Technology Vulnerabilities 39
Data Loss/Leakage 40
Account, Service, and Traffic Hijacking 40
Unknown Risk Profile 40
Other Security Issues in the Cloud 41
Governance 41
IT Governance in the Cloud 44
Managing Service Agreements 44
Implementing and Maintaining Governance for Cloud Computing 46
Implementing Governance as a New Concept 46
Preliminary Tasks 46
Adopt a Governance Implementation Methodology 48
Extending IT Governance to the Cloud 49
In Summary 52
Chapter 4: System and Infrastructure Lifecycle Management for the Cloud 57
Every Decision Involves Making a Tradeoff 57
Example: Business Continuity/Disaster Recovery 59
What about Policy and Process Collisions? 60
The System and Management Lifecycle Onion 61
Mapping Control Methodologies onto the Cloud 62
Information Technology Infrastructure Library 63
Control Objectives for Information and Related Technology 64
National Institute of Standards and Technology 65
Cloud Security Alliance 66
Verifying Your Lifecycle Management 67
Always Start with Compliance Governance 67
Verification Method 68
Illustrative Example 70
Risk Tolerance 72
Special Considerations for Cross-Cloud Deployments 73
The Cloud Provider's Perspective 74
Questions That Matter 75
In Summary 76
Chapter 5: Cloud-Based IT Service Delivery and Support 79
Beyond Mere Migration 80
Architected to Share, Securely 80
Single-Tenant Offsite Operations (Managed Service Providers) 81
Isolated-Tenant Application Services (Application Service Providers) 81
Multitenant (Cloud) Applications and Platforms 82
Granular Privilege Assignment 82
Inherent Transaction Visibility 84
Centralized Community Creation 86
Report
"To summarize, the book is a good review of the current situation in the field. Every CISO and CIO should be aware of the developments in the cloud regardless of the intention of actually implementing its use." (Blog.itgovernance.co.uk, April 2012)
Product details
| Authors | Ben Halpert, Halpert Ben |
| Publisher | Wiley, John and Sons Ltd |
| Languages | English |
| Product format | Hardback |
| Released | 26.08.2011 |
| EAN | 9780470874745 |
| ISBN | 978-0-470-87474-5 |
| No. of pages | 224 |
| Series |
Wiley Corporate F&A |
| Subjects |
Social sciences, law, business
> Business
> Business administration
Rechnungswesen, Revision, Accounting, Auditing, Revision (Wirtsch.), Business mathematics and systems, COMPUTERS / Distributed Systems / Cloud Computing |
Customer reviews
No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.
Write a review
Thumbs up or thumbs down? Write your own review.