Introduction |
|
xv | |
Assessment Test |
|
xxiii | |
Chapter 1 Architectural Concepts |
|
1 | (24) |
|
|
4 | (4) |
|
|
4 | (1) |
|
Quantifying Benefits and Opportunity Cost |
|
|
5 | (3) |
|
|
8 | (1) |
|
Cloud Evolution, Vernacular, and Definitions |
|
|
8 | (5) |
|
New Technology, New Options |
|
|
8 | (2) |
|
Cloud Computing Service Models |
|
|
10 | (1) |
|
|
11 | (2) |
|
Cloud Computing Roles and Responsibilities |
|
|
13 | (1) |
|
Cloud Computing Definitions |
|
|
13 | (3) |
|
Foundational Concepts of Cloud Computing |
|
|
16 | (3) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Cloud Service Provider Contracts |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (5) |
Chapter 2 Design Requirements |
|
25 | (18) |
|
Business Requirements Analysis |
|
|
26 | (5) |
|
|
26 | (1) |
|
|
27 | (1) |
|
Determination of Criticality |
|
|
27 | (2) |
|
|
29 | (2) |
|
Boundaries of Cloud Models |
|
|
31 | (3) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (2) |
|
Design Principles for Protecting Sensitive Data |
|
|
34 | (3) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (5) |
Chapter 3 Data Classification |
|
43 | (24) |
|
Data Inventory and Discovery |
|
|
45 | (5) |
|
|
45 | (1) |
|
|
46 | (3) |
|
|
49 | (1) |
|
Jurisdictional Requirements |
|
|
50 | (1) |
|
|
51 | (6) |
|
Intellectual Property Protections |
|
|
51 | (4) |
|
|
55 | (2) |
|
|
57 | (5) |
|
|
58 | (1) |
|
|
59 | (2) |
|
Data Destruction/Disposal |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (3) |
Chapter 4 Cloud Data Security |
|
67 | (20) |
|
|
69 | (5) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (2) |
|
|
74 | (1) |
|
Cloud Storage Architectures |
|
|
74 | (1) |
|
Volume Storage: File-Based Storage and Block Storage |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
Content Delivery Network (CDN) |
|
|
75 | (1) |
|
Cloud Data Security Foundational Strategies |
|
|
75 | (7) |
|
|
75 | (2) |
|
Masking, Obfuscation, Anonymization, and Tokenization |
|
|
77 | (3) |
|
Security Information and Event Management |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
84 | (3) |
Chapter 5 Security in the Cloud |
|
87 | (28) |
|
Shared Cloud Platform Risks and Responsibilities |
|
|
88 | (2) |
|
Cloud Computing Risks by Deployment and Service Model |
|
|
90 | (8) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (5) |
|
|
97 | (1) |
|
IaaS (Infrastructure as a Service) |
|
|
97 | (1) |
|
PaaS (Platform as a Service) |
|
|
97 | (1) |
|
SaaS (Software as a Service) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (6) |
|
Threats by Deployment Model |
|
|
100 | (2) |
|
Countermeasure Methodology |
|
|
102 | (3) |
|
Disaster Recovery (DR) and Business Continuity Management (BCM) |
|
|
105 | (3) |
|
Cloud-Specific BIA Concerns |
|
|
105 | (1) |
|
Customer/Provider Shared BC/DR Responsibilities |
|
|
106 | (2) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (5) |
Chapter 6 Responsibilities in the Cloud |
|
115 | (26) |
|
Foundations of Managed Services |
|
|
118 | (1) |
|
|
119 | (6) |
|
Business Requirements: The Cloud Provider Perspective |
|
|
119 | (6) |
|
Shared Responsibilities by Service Type |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
Shared Administration of OS, Middleware, or Applications |
|
|
126 | (2) |
|
Operating System Baseline Configuration and Management |
|
|
126 | (2) |
|
Share Responsibilities: Data Access |
|
|
128 | (3) |
|
Customer Directly Administers Access |
|
|
128 | (1) |
|
Provider Administers Access on Behalf of the Customer |
|
|
129 | (1) |
|
Third-Party (CASB) Administers Access on Behalf of the Customer |
|
|
129 | (2) |
|
|
131 | (4) |
|
|
131 | (3) |
|
|
134 | (1) |
|
Shared Monitoring and Testing |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (4) |
Chapter 7 Cloud Application Security |
|
141 | (40) |
|
|
143 | (5) |
|
Common Cloud Application Deployment Pitfalls |
|
|
146 | (2) |
|
Cloud-Secure Software Development Life Cycle (SDLC) |
|
|
148 | (2) |
|
ISO/IEC 27034-1 Standards for Secure Application Development |
|
|
150 | (1) |
|
Identity and Access Management (IAM) |
|
|
151 | (6) |
|
Identity Repositories and Directory Services |
|
|
153 | (1) |
|
|
153 | (1) |
|
Federated Identity Management |
|
|
153 | (1) |
|
|
154 | (1) |
|
Multifactor Authentication |
|
|
155 | (1) |
|
Supplemental Security Devices |
|
|
155 | (2) |
|
Cloud Application Architecture |
|
|
157 | (5) |
|
Application Programming Interfaces |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
159 | (3) |
|
|
162 | (1) |
|
Application Virtualization |
|
|
162 | (1) |
|
Cloud Application Assurance and Validation |
|
|
162 | (12) |
|
|
163 | (3) |
|
|
166 | (1) |
|
Software Security Testing |
|
|
166 | (5) |
|
|
171 | (1) |
|
Software Supply Chain (API) Management |
|
|
171 | (1) |
|
Securing Open Source Software |
|
|
172 | (1) |
|
Runtime Application Self-Protection (RASP) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (5) |
Chapter 8 Operations Elements |
|
181 | (32) |
|
Physical/Logical Operations |
|
|
183 | (15) |
|
Facilities and Redundancy |
|
|
184 | (10) |
|
Virtualization Operations |
|
|
194 | (1) |
|
|
195 | (2) |
|
Physical and Logical Isolation |
|
|
197 | (1) |
|
Security Training and Awareness |
|
|
198 | (5) |
|
Training Program Categories |
|
|
199 | (4) |
|
Additional Training Insights |
|
|
203 | (1) |
|
Basic Operational Application Security |
|
|
203 | (3) |
|
|
204 | (1) |
|
Application Testing Methods |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
208 | (5) |
Chapter 9 Operations Management |
|
213 | (26) |
|
Monitoring, Capacity, and Maintenance |
|
|
215 | (6) |
|
|
215 | (2) |
|
|
217 | (4) |
|
Change and Configuration Management (CM) |
|
|
221 | (4) |
|
|
221 | (1) |
|
Deviations and Exceptions |
|
|
222 | (1) |
|
|
223 | (2) |
|
Business Continuity and Disaster Recovery (BC/DR) |
|
|
225 | (8) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
227 | (2) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
235 | (4) |
Chapter 10 Legal and Compliance Part 1 |
|
239 | (40) |
|
Legal Requirements and Unique Risks in the Cloud Environment |
|
|
241 | (20) |
|
|
241 | (6) |
|
|
247 | (5) |
|
|
252 | (1) |
|
Laws, Frameworks, and Standards Around the World |
|
|
252 | (9) |
|
The Difference Between Laws, Regulations and Standards |
|
|
261 | (1) |
|
Potential Personal and Data Privacy Issues in the Cloud Environment |
|
|
261 | (4) |
|
|
262 | (1) |
|
|
263 | (1) |
|
International Conflict Resolution |
|
|
263 | (1) |
|
Cloud Forensic Challenges |
|
|
263 | (1) |
|
Contractual and Regulated PII |
|
|
264 | (1) |
|
Direct and Indirect Identifiers |
|
|
264 | (1) |
|
Audit Processes, Methodologies, and Cloud Adaptations |
|
|
265 | (6) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
Information Security Management Systems (ISMSs) |
|
|
266 | (1) |
|
The Right to Audit in Managed Services |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
268 | (1) |
|
Different Types of Audit Reports |
|
|
268 | (1) |
|
|
269 | (1) |
|
AICPA Reports and Standards |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
274 | (5) |
Chapter 11 Legal and Compliance Part 2 |
|
279 | (30) |
|
The Impact of Diverse Geographical Locations and Legal Jurisdictions |
|
|
281 | (16) |
|
|
282 | (5) |
|
Implications of the Cloud for Enterprise Risk Management |
|
|
287 | (1) |
|
Choices Involved in Managing Risk |
|
|
288 | (3) |
|
Risk Management Frameworks |
|
|
291 | (2) |
|
|
293 | (1) |
|
Contracts and Service-Level Agreements (SLAB) |
|
|
294 | (3) |
|
|
297 | (1) |
|
Cloud Contract Design and Management for Outsourcing |
|
|
297 | (1) |
|
Identifying Appropriate Supply Chain and Vendor Management Processes |
|
|
298 | (5) |
|
Common Criteria Assurance Framework (ISO/IEC 15408-1:2009) |
|
|
299 | (1) |
|
Cloud Computing Certification |
|
|
299 | (1) |
|
CSA Security, Trust, and Assurance Registry (STAR) |
|
|
300 | (2) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
305 | (4) |
Appendix A Answers to the Review Questions |
|
309 | (18) |
|
Chapter 1: Architectural Concepts |
|
|
310 | (1) |
|
Chapter 2: Design Requirements |
|
|
311 | (1) |
|
Chapter 3: Data Classification |
|
|
312 | (2) |
|
Chapter 4: Cloud Data Security |
|
|
314 | (2) |
|
Chapter 5: Security in the Cloud |
|
|
316 | (1) |
|
Chapter 6: Responsibilities in the Cloud |
|
|
317 | (2) |
|
Chapter 7: Cloud Application Security |
|
|
319 | (1) |
|
Chapter 8: Operations Elements |
|
|
320 | (1) |
|
Chapter 9: Operations Management |
|
|
321 | (2) |
|
Chapter 10: Legal and Compliance Part 1 |
|
|
323 | (2) |
|
Chapter 11: Legal and Compliance Part 2 |
|
|
325 | (2) |
Appendix B Answers to the Written Labs |
|
327 | (8) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
Index |
|
335 | |