Foreword to the Fourth Edition |
|
xix | |
Introduction |
|
xxi | |
|
Chapter 1 Cloud Concepts, Architecture, and Design |
|
|
1 | (56) |
|
Understand Cloud Computing Concepts |
|
|
2 | (12) |
|
Cloud Computing Definitions |
|
|
2 | (1) |
|
Cloud Computing Roles and Responsibilities |
|
|
3 | (4) |
|
Key Cloud Computing Characteristics |
|
|
7 | (4) |
|
Building Block Technologies |
|
|
11 | (3) |
|
Describe Cloud Reference Architecture |
|
|
14 | (19) |
|
Cloud Computing Activities |
|
|
14 | (1) |
|
Cloud Service Capabilities |
|
|
15 | (2) |
|
|
17 | (1) |
|
|
18 | (3) |
|
Cloud Shared Considerations |
|
|
21 | (6) |
|
Impact of Related Technologies |
|
|
27 | (6) |
|
Understand Security Concepts Relevant to Cloud Computing |
|
|
33 | (10) |
|
Cryptography and Key Management |
|
|
33 | (1) |
|
Identity and Access Control |
|
|
34 | (2) |
|
Data and Media Sanitization |
|
|
36 | (1) |
|
|
37 | (2) |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
41 | (2) |
|
Understand Design Principles of Secure Cloud Computing |
|
|
43 | (8) |
|
Cloud Secure Data Lifecycle |
|
|
43 | (1) |
|
Cloud-Based Business Continuity and Disaster Recovery Plan |
|
|
44 | (1) |
|
|
45 | (1) |
|
Functional Security Requirements |
|
|
46 | (2) |
|
Security Considerations for Different Cloud Categories |
|
|
48 | (1) |
|
|
49 | (2) |
|
|
51 | (1) |
|
Evaluate Cloud Service Providers |
|
|
51 | (5) |
|
Verification against Criteria |
|
|
52 | (2) |
|
System/Subsystem Product Certifications |
|
|
54 | (2) |
|
|
56 | (1) |
|
Chapter 2 Cloud Data Security |
|
|
57 | (46) |
|
Describe Cloud Data Concepts |
|
|
58 | (5) |
|
Cloud Data Lifecycle Phases |
|
|
58 | (3) |
|
|
61 | (1) |
|
|
62 | (1) |
|
Design and Implement Cloud Data Storage Architectures |
|
|
63 | (4) |
|
|
63 | (3) |
|
|
66 | (1) |
|
Design and Apply Data Security Technologies and Strategies |
|
|
67 | (11) |
|
Encryption and Key Management |
|
|
67 | (3) |
|
|
70 | (1) |
|
|
71 | (2) |
|
|
73 | (1) |
|
|
74 | (3) |
|
Keys, Secrets, and Certificates Management |
|
|
77 | (1) |
|
|
78 | (4) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
Implement Data Classification |
|
|
82 | (5) |
|
Data Classification Policies |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
86 | (1) |
|
Design and Implement Information Rights Management |
|
|
87 | (2) |
|
|
88 | (1) |
|
|
89 | (1) |
|
Plan and Implement Data Retention, Deletion, and Archiving Policies |
|
|
89 | (7) |
|
|
90 | (3) |
|
Data Deletion Procedures and Mechanisms |
|
|
93 | (1) |
|
Data Archiving Procedures and Mechanisms |
|
|
94 | (1) |
|
|
95 | (1) |
|
Design and Implement Auditability, Traceability, and Accountability of Data Events |
|
|
96 | (5) |
|
Definition of Event Sources and Requirement of Event Attribution |
|
|
97 | (2) |
|
Logging, Storage, and Analysis of Data Events |
|
|
99 | (1) |
|
Chain of Custody and Nonrepudiation |
|
|
100 | (1) |
|
|
101 | (2) |
|
Chapter 3 Cloud Platform and Infrastructure Security |
|
|
103 | (36) |
|
Comprehend Cloud Infrastructure and Platform Components |
|
|
104 | (9) |
|
|
104 | (2) |
|
Network and Communications |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (2) |
|
|
110 | (1) |
|
|
111 | (2) |
|
Design a Secure Data Center |
|
|
113 | (6) |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
117 | (2) |
|
Analyze Risks Associated with Cloud Infrastructure and Platforms |
|
|
119 | (5) |
|
|
119 | (3) |
|
Cloud Vulnerabilities, Threats, and Attacks |
|
|
122 | (1) |
|
Risk Mitigation Strategies |
|
|
123 | (1) |
|
Plan and Implementation of Security Controls |
|
|
124 | (7) |
|
Physical and Environmental Protection |
|
|
124 | (1) |
|
System, Storage, and Communication Protection |
|
|
125 | (2) |
|
Identification, Authentication, and Authorization in Cloud Environments |
|
|
127 | (1) |
|
|
128 | (3) |
|
Plan Disaster Recovery and Business Continuity |
|
|
131 | (7) |
|
Business Continuity/Disaster Recovery Strategy |
|
|
131 | (1) |
|
|
132 | (2) |
|
Creation, Implementation, and Testing of Plan |
|
|
134 | (4) |
|
|
138 | (1) |
|
Chapter 4 Cloud Application Security |
|
|
139 | (42) |
|
Advocate Training and Awareness for Application Security |
|
|
140 | (4) |
|
|
140 | (1) |
|
|
141 | (1) |
|
Common Cloud Vulnerabilities |
|
|
142 | (2) |
|
Describe the Secure Software Development Life Cycle Process |
|
|
144 | (5) |
|
NIST Secure Software Development Framework |
|
|
145 | (1) |
|
OWASP Software Assurance Maturity Model |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (3) |
|
Apply the Secure Software Development Life Cycle |
|
|
149 | (9) |
|
|
149 | (4) |
|
|
153 | (3) |
|
Avoid Common Vulnerabilities during Development |
|
|
156 | (1) |
|
|
156 | (1) |
|
Software Configuration Management and Versioning |
|
|
157 | (1) |
|
Apply Cloud Software Assurance and Validation |
|
|
158 | (7) |
|
Functional and Non-functional Testing |
|
|
159 | (1) |
|
Security Testing Methodologies |
|
|
160 | (4) |
|
|
164 | (1) |
|
|
164 | (1) |
|
Use Verified Secure Software |
|
|
165 | (3) |
|
Securing Application Programming Interfaces |
|
|
165 | (1) |
|
|
166 | (1) |
|
Third-Party Software Management |
|
|
166 | (1) |
|
Validated Open-Source Software |
|
|
167 | (1) |
|
Comprehend the Specifics of Cloud Application Architecture |
|
|
168 | (6) |
|
Supplemental Security Components |
|
|
169 | (2) |
|
|
171 | (1) |
|
|
172 | (1) |
|
Application Virtualization and Orchestration |
|
|
173 | (1) |
|
Design Appropriate Identity and Access Management Solutions |
|
|
174 | (5) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
Multifactor Authentication |
|
|
176 | (2) |
|
Cloud Access Security Broker |
|
|
178 | (1) |
|
|
179 | (2) |
|
Chapter 5 Cloud Security Operations |
|
|
181 | (74) |
|
Build and Implement Physical and Logical Infrastructure for Cloud Environment |
|
|
182 | (6) |
|
Hardware-Specific Security Configuration Requirements |
|
|
182 | (3) |
|
Installation and Configuration of Virtualization Management Tools |
|
|
185 | (1) |
|
Virtual Hardware-Specific Security Configuration Requirements |
|
|
186 | (2) |
|
Installation of Guest Operating System Virtualization Toolsets |
|
|
188 | (1) |
|
Operate Physical and Logical Infrastructure for Cloud Environment |
|
|
188 | (12) |
|
Configure Access Control for Local and Remote Access |
|
|
188 | (2) |
|
Secure Network Configuration |
|
|
190 | (5) |
|
Operating System Hardening through the Application of Baselines |
|
|
195 | (1) |
|
Availability of Stand-Alone Hosts |
|
|
196 | (1) |
|
Availability of Clustered Hosts |
|
|
197 | (2) |
|
Availability of Guest Operating Systems |
|
|
199 | (1) |
|
Manage Physical and Logical Infrastructure for Cloud Environment |
|
|
200 | (12) |
|
Access Controls for Remote Access |
|
|
201 | (1) |
|
Operating System Baseline Compliance Monitoring and Remediation |
|
|
202 | (1) |
|
|
203 | (2) |
|
Performance and Capacity Monitoring |
|
|
205 | (1) |
|
|
206 | (1) |
|
Configuration of Host and Guest Operating System Backup and Restore Functions |
|
|
207 | (1) |
|
Network Security Controls |
|
|
208 | (4) |
|
|
212 | (1) |
|
Implement Operational Controls and Standards |
|
|
212 | (16) |
|
|
213 | (1) |
|
|
214 | (2) |
|
Information Security Management |
|
|
216 | (1) |
|
Continual Service Improvement Management |
|
|
217 | (1) |
|
|
218 | (3) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
222 | (2) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
Support Digital Forensics |
|
|
228 | (6) |
|
Forensic Data Collection Methodologies |
|
|
228 | (2) |
|
|
230 | (1) |
|
Collect, Acquire, and Preserve Digital Evidence |
|
|
231 | (3) |
|
Manage Communication with Relevant Parties |
|
|
234 | (5) |
|
|
235 | (1) |
|
|
236 | (2) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
Manage Security Operations |
|
|
239 | (14) |
|
Security Operations Center |
|
|
240 | (4) |
|
Monitoring of Security Controls |
|
|
244 | (1) |
|
|
245 | (3) |
|
|
248 | (5) |
|
|
253 | (2) |
|
Chapter 6 Legal, Risk, and Compliance |
|
|
255 | (62) |
|
Articulating Legal Requirements and Unique Risks within the Cloud Environment |
|
|
256 | (11) |
|
Conflicting International Legislation |
|
|
256 | (2) |
|
Evaluation of Legal Risks Specific to Cloud Computing |
|
|
258 | (1) |
|
Legal Frameworks and Guidelines |
|
|
258 | (7) |
|
|
265 | (2) |
|
|
267 | (1) |
|
Understand Privacy Issues |
|
|
267 | (14) |
|
Difference between Contractual and Regulated Private Data |
|
|
268 | (4) |
|
Country-Specific Legislation Related to Private Data |
|
|
272 | (5) |
|
Jurisdictional Differences in Data Privacy |
|
|
277 | (1) |
|
Standard Privacy Requirements |
|
|
278 | (2) |
|
Privacy Impact Assessments |
|
|
280 | (1) |
|
Understanding Audit Process, Methodologies, and Required Adaptations for a Cloud Environment |
|
|
281 | (18) |
|
Internal and External Audit Controls |
|
|
282 | (1) |
|
Impact of Audit Requirements |
|
|
283 | (1) |
|
Identify Assurance Challenges of Virtualization and Cloud |
|
|
284 | (1) |
|
|
285 | (3) |
|
Restrictions of Audit Scope Statements |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
|
Internal Information Security Management System |
|
|
291 | (1) |
|
Internal Information Security Controls System |
|
|
292 | (1) |
|
|
293 | (3) |
|
Identification and Involvement of Relevant Stakeholders |
|
|
296 | (1) |
|
Specialized Compliance Requirements for Highly Regulated Industries |
|
|
297 | (1) |
|
Impact of Distributed Information Technology Model |
|
|
298 | (1) |
|
Understand Implications of Cloud to Enterprise Risk Management |
|
|
299 | (10) |
|
Assess Providers Risk Management Programs |
|
|
300 | (1) |
|
Differences between Data Owner/Controller vs. Data Custodian/Processor |
|
|
301 | (1) |
|
Regulatory Transparency Requirements |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
304 | (3) |
|
Metrics for Risk Management |
|
|
307 | (1) |
|
Assessment of Risk Environment |
|
|
307 | (2) |
|
Understand Outsourcing and Cloud Contract Design |
|
|
309 | (7) |
|
|
309 | (2) |
|
|
311 | (1) |
|
|
312 | (2) |
|
|
314 | (2) |
|
|
316 | (1) |
Index |
|
317 | |