This comprehensive handbook serves as a professional reference and practitioner’s guide to today’s most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.
Foreword |
|
xi | |
Preface |
|
xiii | |
Acknowledgments |
|
xix | |
Editor |
|
xxi | |
Contributors |
|
xxiii | |
|
Section I Introduction to Private Cloud Security |
|
|
|
Chapter 1 Private Cloud Computing Essentials |
|
|
3 | (14) |
|
|
Chapter 2 Integration of Enterprise Content Management and Software as a Service |
|
|
17 | (20) |
|
|
Chapter 3 Infrastructure as a Service |
|
|
37 | (10) |
|
|
Chapter 4 Preservation as a Service for Trust |
|
|
47 | (26) |
|
|
|
|
|
|
|
|
Chapter 5 Software and Data Segregation Security |
|
|
73 | (16) |
|
|
Section II Achieving Security in a Private Cloud |
|
|
|
Chapter 6 Taking Full Responsibility for Cyber Security in the Private Cloud |
|
|
89 | (12) |
|
|
Chapter 7 Selecting the Appropriate Product |
|
|
101 | (12) |
|
|
Chapter 8 Virtual Private Cloud |
|
|
113 | (28) |
|
|
Chapter 9 Security in the Virtual Private Cloud |
|
|
141 | (14) |
|
|
Section III Implementing Security in a Private Cloud |
|
|
|
Chapter 10 The Hybrid Cloud Alternative |
|
|
155 | (14) |
|
|
Chapter 11 Identification and Privacy in the Secure Cloud |
|
|
169 | (10) |
|
|
Chapter 12 Private Cloud Security and Identification |
|
|
179 | (14) |
|
|
Chapter 13 Secure Management of Virtualized Resources |
|
|
193 | (26) |
|
|
|
|
Chapter 14 Designing Cloud Security and Operations Models in the Changed Geopolitical Environment |
|
|
219 | (16) |
|
|
Chapter 15 Continuous Private Cloud Security Monitoring |
|
|
235 | (26) |
|
|
Chapter 16 Cloud Security Assessment and Authorization |
|
|
261 | (10) |
|
|
Chapter 17 Assessment and Authorization in Private Cloud Security |
|
|
271 | (18) |
|
|
|
|
Section IV Advanced Private Cloud Computing Security |
|
|
|
Chapter 18 Advanced Security Architectures for Private Cloud Computing |
|
|
289 | (14) |
|
|
|
Chapter 19 Advanced Private Cloud Computing Security Architectures |
|
|
303 | (16) |
|
|
Chapter 20 Privacy Protection in Cloud Computing through Architectural Design |
|
|
319 | (28) |
|
|
|
|
|
|
|
347 | (4) |
|
|
351 | (8) |
|
|
359 | (2) |
Glossary |
|
361 | (6) |
Index |
|
367 | |
John Vacca is an information technology consultant and internationally-known author of more than 600 articles in the areas of advanced storage, computer security and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program, from 1988 until his retirement from NASA in 1995.