|
|
xiii | |
|
|
xv | |
|
Part I Rethinking IT and Security |
|
|
|
Chapter 1 Tectonic Shifts |
|
|
3 | (8) |
|
|
3 | (1) |
|
1.2 Deconstructing Cloud Computing |
|
|
3 | (4) |
|
|
3 | (1) |
|
1.2.2 The Three Service Models |
|
|
4 | (2) |
|
1.2.3 The Four Deployment Models |
|
|
6 | (1) |
|
|
7 | (2) |
|
|
9 | (1) |
|
|
10 | (1) |
|
Chapter 2 The Evolving Threat Landscape |
|
|
11 | (28) |
|
2.1 From Cryptographers to World Leaders |
|
|
11 | (1) |
|
2.2 The Changing Threat Landscape |
|
|
12 | (2) |
|
|
14 | (5) |
|
|
14 | (1) |
|
|
15 | (1) |
|
2.3.3 Hacktivism and Cloud |
|
|
16 | (1) |
|
2.3.4 Hacktivism and Mobility |
|
|
17 | (1) |
|
2.3.5 Hacktivism and Security |
|
|
17 | (2) |
|
2.4 Organized Cyber Crime |
|
|
19 | (6) |
|
|
19 | (1) |
|
|
19 | (1) |
|
2.4.3 Organized Crime and Cloud |
|
|
20 | (2) |
|
2.4.4 Organized Crime and Mobility |
|
|
22 | (2) |
|
2.4.5 Organized Crime and Security |
|
|
24 | (1) |
|
2.5 Cyber Espionage and Terrorism |
|
|
25 | (4) |
|
|
25 | (1) |
|
|
26 | (1) |
|
2.5.3 Cyber Espionage, Terrorism, and Cloud |
|
|
27 | (1) |
|
2.5.4 Cyber Espionage, Terrorism, and Mobility |
|
|
27 | (1) |
|
2.5.5 Cyber Espionage, Terrorism, and Security |
|
|
28 | (1) |
|
|
29 | (3) |
|
2.6.1 Motivation and Modus Operandi |
|
|
29 | (1) |
|
2.6.2 Hackers for Hire and the Cloud |
|
|
30 | (1) |
|
2.6.3 Hackers for Hire and Mobility |
|
|
30 | (1) |
|
2.6.4 Hackers for Hire and Security |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (6) |
|
Part II Deconstructing Cloud Security |
|
|
|
Chapter 3 Cloud Dialogues |
|
|
39 | (14) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
43 | (3) |
|
|
46 | (3) |
|
3.7 Service Level Agreements |
|
|
49 | (1) |
|
|
50 | (3) |
|
Part III Securing Private Cloud Computing |
|
|
|
Chapter 4 Segmentation and the Private Cloud |
|
|
53 | (12) |
|
4.1 Physical and Logical Segmentation |
|
|
53 | (1) |
|
4.2 Physical Segmentation |
|
|
54 | (2) |
|
4.3 Physical and Virtual Segmentation |
|
|
56 | (2) |
|
4.4 Highly Optimized Segmentation Model |
|
|
58 | (2) |
|
4.5 Production-Based Segmentation Model |
|
|
60 | (1) |
|
4.6 Storage Segmentation Model |
|
|
60 | (5) |
|
Chapter 5 Orchestration and Cloud Management |
|
|
65 | (10) |
|
5.1 What Is Orchestration? |
|
|
65 | (1) |
|
5.2 Benefits and Challenges |
|
|
65 | (3) |
|
5.3 Information Security Considerations |
|
|
68 | (7) |
|
5.3.1 Secure Service Delivery Workflows |
|
|
69 | (1) |
|
5.3.2 Secure Resource Delivery Automation |
|
|
69 | (3) |
|
5.3.3 Secure Orchestration Management |
|
|
72 | (1) |
|
5.3.4 Security Monitoring |
|
|
72 | (3) |
|
Chapter 6 Encryption Services |
|
|
75 | (18) |
|
6.1 Holistic Encryption Strategy |
|
|
75 | (1) |
|
|
76 | (1) |
|
6.3 Transport Layer Encryption |
|
|
77 | (2) |
|
6.3.1 Secure Socket Layer (SSL) |
|
|
77 | (1) |
|
6.3.2 Virtual Private Networks (VPNs) |
|
|
77 | (1) |
|
|
78 | (1) |
|
6.3.4 Secure File Transfer Protocol (SFTP) |
|
|
78 | (1) |
|
6.3.5 Transport Layer Security (TLS) |
|
|
79 | (1) |
|
6.4 Data Layer Encryption |
|
|
79 | (9) |
|
6.4.1 Database Encryption |
|
|
80 | (1) |
|
|
80 | (3) |
|
6.4.3 Encryption Appliances |
|
|
83 | (1) |
|
|
84 | (2) |
|
6.4.5 Virtualization Encryption |
|
|
86 | (2) |
|
6.5 Key Management Life Cycle |
|
|
88 | (3) |
|
|
91 | (2) |
|
Chapter 7 Threat Intelligence |
|
|
93 | (10) |
|
7.1 Security Threats to Private Cloud |
|
|
93 | (2) |
|
7.2 Threat Prevention Strategies |
|
|
95 | (1) |
|
7.3 Threat Detection Toolset |
|
|
95 | (4) |
|
7.4 Making Threat Detection Intelligent |
|
|
99 | (4) |
|
Chapter 8 Identity Management for Private Clouds |
|
|
103 | (12) |
|
|
103 | (2) |
|
8.2 Challenges of Disparate Identity Repositories |
|
|
105 | (1) |
|
8.3 Centralizing Identity Repositories |
|
|
106 | (9) |
|
8.3.1 Entitlements Aggregator |
|
|
106 | (2) |
|
8.3.2 Authoritative Sources of Identities |
|
|
108 | (1) |
|
8.3.3 Administrative Access |
|
|
109 | (1) |
|
|
109 | (1) |
|
8.3.5 Central Identity Repository |
|
|
110 | (5) |
|
Part IV Securing Public Clouds |
|
|
|
Chapter 9 Enterprise Cloud Governance |
|
|
115 | (10) |
|
9.1 Security Exposure of Public Cloud Use |
|
|
115 | (1) |
|
9.2 Corporate Cloud Use Policy |
|
|
116 | (2) |
|
|
118 | (2) |
|
9.4 Cloud Approval Workflow |
|
|
120 | (3) |
|
|
123 | (2) |
|
Chapter 10 Cursory Cloud Use Review |
|
|
125 | (8) |
|
|
125 | (1) |
|
10.2 Interview with Cloud Service Provider |
|
|
126 | (4) |
|
10.3 Cursory Review-Assessment Report |
|
|
130 | (3) |
|
Chapter 11 In-Depth Cloud Assessment |
|
|
133 | (22) |
|
|
133 | (1) |
|
11.2 Interview with the Requestor |
|
|
134 | (2) |
|
|
136 | (2) |
|
|
138 | (4) |
|
|
138 | (1) |
|
11.4.2 Data Protection Questions for All Service Models |
|
|
139 | (1) |
|
11.4.3 SaaS Data Protection Questions |
|
|
139 | (2) |
|
11.4.4 PaaS Data Protection Questions |
|
|
141 | (1) |
|
11.4.5 IaaS Data Protection Questions |
|
|
142 | (1) |
|
11.5 Security Architecture |
|
|
142 | (2) |
|
11.6 Application Security |
|
|
144 | (1) |
|
|
144 | (1) |
|
11.6.2 SaaS Application Security |
|
|
144 | (1) |
|
11.6.3 PaaS Application Security |
|
|
145 | (1) |
|
11.7 Identity and Access Management |
|
|
145 | (4) |
|
|
145 | (1) |
|
11.7.2 Identity Access Management for CSP Staff |
|
|
146 | (1) |
|
11.7.3 Identity and Access Management for CSP Customers |
|
|
147 | (2) |
|
|
149 | (2) |
|
11.9 Electronic Discovery |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (2) |
|
Chapter 12 Third-Party Cloud Assessment |
|
|
155 | (6) |
|
|
155 | (1) |
|
12.2 Selecting an Assessor |
|
|
156 | (1) |
|
|
156 | (2) |
|
|
158 | (3) |
|
|
|
Chapter 13 Mobile Security Infrastructure |
|
|
161 | (8) |
|
|
161 | (1) |
|
13.2 BlackBerry® Enterprise Server Architecture |
|
|
161 | (2) |
|
13.3 Exchange to Support iOS, Android™, and Windows® Phone |
|
|
163 | (2) |
|
|
165 | (4) |
|
Chapter 14 The Mobile Client Itself |
|
|
169 | (14) |
|
|
169 | (1) |
|
14.2 Tablet and Smart Phone Security Issues |
|
|
169 | (1) |
|
14.3 Bring Your Own Device (BYOD) |
|
|
170 | (2) |
|
|
172 | (1) |
|
14.5 Lack of Good Authentication and Password Controls |
|
|
173 | (1) |
|
14.6 Unfiltered Mobile Apps |
|
|
174 | (1) |
|
14.7 Saying No Is a Tricky Business |
|
|
175 | (1) |
|
14.8 Updating Mobile Standards and Searching for Solutions |
|
|
175 | (2) |
|
14.9 Performing Sanity Testing |
|
|
177 | (2) |
|
14.10 Garnering Executive Support and the Big Win |
|
|
179 | (2) |
|
|
181 | (2) |
|
Chapter 15 Connecting to Enterprise and Third-Party Applications from Mobile Devices |
|
|
183 | (10) |
|
|
183 | (1) |
|
15.2 Connecting to Exchange |
|
|
183 | (1) |
|
|
184 | (2) |
|
15.4 Connecting to Microsoft SharePoint® 2010 or Later |
|
|
186 | (1) |
|
15.5 Connecting to a Desktop or Server |
|
|
187 | (2) |
|
15.6 Connecting to File Shares |
|
|
189 | (1) |
|
15.7 Connecting to or Installing Third-Party Applications |
|
|
190 | (1) |
|
|
191 | (2) |
|
Chapter 16 Creating Secure Mobile Applications |
|
|
193 | (10) |
|
16.1 Mobile Application Development in Your Organization |
|
|
193 | (1) |
|
16.2 Start with the Stakeholders |
|
|
194 | (2) |
|
16.3 Step through the Entire SDLC |
|
|
196 | (4) |
|
16.4 Guidelines Regarding Enterprise App Store/Google® Play |
|
|
200 | (1) |
|
16.4.1 Overview of Infrastructure |
|
|
200 | (1) |
|
16.4.2 Overview of Environment Setup and General Controls |
|
|
200 | (1) |
|
16.4.3 A Note about Publishing Your Apps |
|
|
201 | (1) |
|
16.4.3.1 Dealing with the Apple® App Store |
|
|
201 | (1) |
|
16.4.3.2 Dealing with Android's Google Play |
|
|
201 | (1) |
|
|
201 | (2) |
Index |
|
203 | |