Introduction |
|
xxi | |
Assessment Test |
|
xxviii | |
|
Chapter 1 Architectural Concepts |
|
|
1 | (24) |
|
|
2 | (2) |
|
|
4 | (5) |
|
|
5 | (1) |
|
Quantifying Benefits and Opportunity Cost |
|
|
6 | (2) |
|
|
8 | (1) |
|
Cloud Evolution, Vernacular, and Models |
|
|
9 | (4) |
|
New Technology, New Options |
|
|
9 | (1) |
|
Cloud Computing Service Models |
|
|
10 | (2) |
|
|
12 | (1) |
|
Cloud Computing Roles and Responsibilities |
|
|
13 | (1) |
|
Cloud Computing Definitions |
|
|
14 | (2) |
|
Foundational Concepts of Cloud Computing |
|
|
16 | (2) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
Cloud Service Provider Contracts |
|
|
17 | (1) |
|
Related and Emerging Technologies |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (4) |
|
Chapter 2 Design Requirements |
|
|
25 | (18) |
|
Business Requirements Analysis |
|
|
26 | (5) |
|
|
26 | (1) |
|
|
27 | (1) |
|
Determination of Criticality |
|
|
27 | (2) |
|
|
29 | (2) |
|
Security Considerations for Different Cloud Categories |
|
|
31 | (2) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
Design Principles for Protecting Sensitive Data |
|
|
33 | (3) |
|
|
33 | (2) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (5) |
|
Chapter 3 Data Classification |
|
|
43 | (28) |
|
Data Inventory and Discovery |
|
|
45 | (6) |
|
|
45 | (1) |
|
|
46 | (4) |
|
|
50 | (1) |
|
Jurisdictional Requirements |
|
|
51 | (2) |
|
Information Rights Management (IRM) |
|
|
53 | (6) |
|
Intellectual Property Protections |
|
|
53 | (4) |
|
|
57 | (2) |
|
|
59 | (6) |
|
|
60 | (1) |
|
|
61 | (2) |
|
Data Destruction/Disposal |
|
|
63 | (2) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (4) |
|
Chapter 4 Cloud Data Security |
|
|
71 | (22) |
|
|
73 | (5) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
Cloud Storage Architectures |
|
|
78 | (1) |
|
Volume Storage: File-Based Storage and Block Storage |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
Content Delivery Network (CDN) |
|
|
79 | (1) |
|
Cloud Data Security Foundational Strategies |
|
|
79 | (7) |
|
|
79 | (2) |
|
Masking, Obfuscation, Anonymization, and Tokenization |
|
|
81 | (3) |
|
Security Information and Event Management |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (5) |
|
Chapter 5 Security in the Cloud |
|
|
93 | (30) |
|
Shared Cloud Platform Risks and Responsibilities |
|
|
95 | (2) |
|
Cloud Computing Risks by Deployment Model |
|
|
97 | (7) |
|
|
98 | (1) |
|
|
98 | (2) |
|
|
100 | (4) |
|
|
104 | (1) |
|
Cloud Computing Risks by Service Model |
|
|
104 | (2) |
|
Infrastructure as a Service (IaaS) |
|
|
104 | (1) |
|
Platform as a Service (PaaS) |
|
|
105 | (1) |
|
Software as a Service (SaaS) |
|
|
106 | (1) |
|
|
106 | (6) |
|
|
107 | (2) |
|
Countermeasure Methodology |
|
|
109 | (3) |
|
Disaster Recovery (DR) and Business Continuity (BC) |
|
|
112 | (4) |
|
Cloud-Specific BIA Concerns |
|
|
112 | (1) |
|
Customer/Provider Shared BC/DR Responsibilities |
|
|
113 | (3) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
118 | (5) |
|
Chapter 6 Responsibilities in the Cloud |
|
|
123 | (26) |
|
Foundations of Managed Services |
|
|
126 | (1) |
|
|
127 | (6) |
|
Business Requirements: The Cloud Provider Perspective |
|
|
127 | (6) |
|
Shared Responsibilities by Service Type |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
Shared Administration of OS, Middleware, or Applications |
|
|
134 | (2) |
|
Operating System Baseline Configuration and Management |
|
|
134 | (2) |
|
Shared Responsibilities: Data Access |
|
|
136 | (1) |
|
Customer Directly Administers Access |
|
|
137 | (1) |
|
Provider Administers Access on Behalf of the Customer |
|
|
137 | (1) |
|
Third-Party (CASB) Administers Access on Behalf of the Customer |
|
|
137 | (1) |
|
|
137 | (6) |
|
|
138 | (4) |
|
|
142 | (1) |
|
Shared Monitoring and Testing |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (4) |
|
Chapter 7 Cloud Application Security |
|
|
149 | (32) |
|
|
151 | (5) |
|
Common Cloud Application Deployment Pitfalls |
|
|
154 | (2) |
|
Cloud-Secure Software Development Lifecycle (SDLC) |
|
|
156 | (2) |
|
Configuration Management for the SDLC |
|
|
157 | (1) |
|
ISO/IEC 27034-1 Standards for Secure Application Development |
|
|
158 | (1) |
|
Identity and Access Management (IAM) |
|
|
159 | (5) |
|
Identity Repositories and Directory Services |
|
|
160 | (1) |
|
|
161 | (1) |
|
Federated Identity Management |
|
|
161 | (1) |
|
|
162 | (1) |
|
Multifactor Authentication |
|
|
162 | (1) |
|
Supplemental Security Components |
|
|
163 | (1) |
|
Cloud Application Architecture |
|
|
164 | (3) |
|
Application Programming Interfaces |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
Application Virtualization |
|
|
167 | (1) |
|
Cloud Application Assurance and Validation |
|
|
167 | (8) |
|
|
167 | (2) |
|
|
169 | (1) |
|
Software Security Testing |
|
|
170 | (2) |
|
|
172 | (1) |
|
Software Supply Chain (API) Management |
|
|
172 | (1) |
|
Securing Open-Source Software |
|
|
172 | (1) |
|
Application Orchestration |
|
|
173 | (1) |
|
The Secure Network Environment |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (4) |
|
Chapter 8 Operations Elements |
|
|
181 | (28) |
|
Physical/Logical Operations |
|
|
183 | (18) |
|
Facilities and Redundancy |
|
|
184 | (10) |
|
Virtualization Operations |
|
|
194 | (2) |
|
|
196 | (3) |
|
Physical and Logical Isolation |
|
|
199 | (1) |
|
Application Testing Methods |
|
|
200 | (1) |
|
Security Operations Center |
|
|
201 | (2) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (4) |
|
Chapter 9 Operations Management |
|
|
209 | (28) |
|
Monitoring, Capacity, and Maintenance |
|
|
211 | (6) |
|
|
211 | (2) |
|
|
213 | (4) |
|
Change and Configuration Management (CM) |
|
|
217 | (5) |
|
|
218 | (1) |
|
Deviations and Exceptions |
|
|
218 | (1) |
|
|
219 | (2) |
|
|
221 | (1) |
|
IT Service Management and Continual Service Improvement |
|
|
222 | (1) |
|
Business Continuity and Disaster Recovery (BC/DR) |
|
|
223 | (8) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (2) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
233 | (4) |
|
Chapter 10 Legal and Compliance Part 1 |
|
|
237 | (32) |
|
Legal Requirements and Unique Risks in the Cloud Environment |
|
|
239 | (15) |
|
|
239 | (3) |
|
|
242 | (4) |
|
|
246 | (1) |
|
Laws, Frameworks, and Standards Around the World |
|
|
246 | (6) |
|
Information Security Management Systems (ISMSs) |
|
|
252 | (2) |
|
The Difference between Laws, Regulations, and Standards |
|
|
254 | (1) |
|
Potential Personal and Data Privacy Issues in the Cloud Environment |
|
|
254 | (5) |
|
|
255 | (1) |
|
|
256 | (1) |
|
Conflicting International Legislation |
|
|
256 | (1) |
|
Cloud Forensic Challenges |
|
|
257 | (1) |
|
Direct and Indirect Identifiers |
|
|
258 | (1) |
|
Forensic Data Collection Methodologies |
|
|
258 | (1) |
|
Audit Processes, Methodologies, and Cloud Adaptations |
|
|
259 | (4) |
|
|
259 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
Restrictions of Audit Scope Statements |
|
|
260 | (1) |
|
|
261 | (1) |
|
Different Types of Audit Reports |
|
|
261 | (1) |
|
|
262 | (1) |
|
AICPA Reports and Standards |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
265 | (4) |
|
Chapter 11 Legal and Compliance Part 2 |
|
|
269 | (26) |
|
The Impact of Diverse Geographical Locations and Legal Jurisdictions |
|
|
271 | (13) |
|
|
272 | (4) |
|
Implications of the Cloud for Enterprise Risk Management |
|
|
276 | (1) |
|
Choices Involved in Managing Risk |
|
|
276 | (3) |
|
Risk Management Frameworks |
|
|
279 | (2) |
|
|
281 | (1) |
|
Contracts and Service-Level Agreements (SLAs) |
|
|
281 | (3) |
|
|
284 | (1) |
|
Cloud Contract Design and Management for Outsourcing |
|
|
284 | (1) |
|
Identifying Appropriate Supply Chain and Vendor Management Processes |
|
|
285 | (4) |
|
Common Criteria Assurance Framework (ISO/IEC 15408-1:2009) |
|
|
285 | (1) |
|
CSA Security, Trust, and Assurance Registry (STAR) |
|
|
286 | (1) |
|
|
287 | (1) |
|
Manage Communication with Relevant Parties |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
289 | (1) |
|
|
289 | (1) |
|
|
290 | (5) |
|
Appendix A Answers to Written Labs |
|
|
295 | (8) |
|
Chapter 1 Architectural Concepts |
|
|
296 | (1) |
|
Chapter 2 Design Requirements |
|
|
296 | (1) |
|
Chapter 3 Data Classification |
|
|
297 | (1) |
|
Chapter 4 Cloud Data Security |
|
|
298 | (1) |
|
Chapter 5 Security in the Cloud |
|
|
299 | (1) |
|
Chapter 6 Responsibilities in the Cloud |
|
|
299 | (1) |
|
Chapter 7 Cloud Application Security |
|
|
300 | (1) |
|
Chapter 8 Operations Elements |
|
|
300 | (1) |
|
Chapter 9 Operations Management |
|
|
301 | (1) |
|
Chapter 10 Legal and Compliance Part 1 |
|
|
302 | (1) |
|
Chapter 11 Legal and Compliance Part 2 |
|
|
302 | (1) |
|
Appendix B Answers to Review Questions |
|
|
303 | (18) |
|
Chapter 1 Architectural Concepts |
|
|
304 | (1) |
|
Chapter 2 Design Requirements |
|
|
305 | (2) |
|
Chapter 3 Data Classification |
|
|
307 | (1) |
|
Chapter 4 Cloud Data Security |
|
|
308 | (2) |
|
Chapter 5 Security in the Cloud |
|
|
310 | (1) |
|
Chapter 6 Responsibilities in the Cloud |
|
|
311 | (2) |
|
Chapter 7 Cloud Application Security |
|
|
313 | (1) |
|
Chapter 8 Operations Elements |
|
|
314 | (2) |
|
Chapter 9 Operations Management |
|
|
316 | (1) |
|
Chapter 10 Legal and Compliance Part 1 |
|
|
317 | (2) |
|
Chapter 11 Legal and Compliance Part 2 |
|
|
319 | (2) |
Index |
|
321 | |