Introduction |
|
xxiii | |
Assessment Test |
|
xxxii | |
|
Chapter 1 Architectural Concepts |
|
|
1 | (34) |
|
|
3 | (2) |
|
|
5 | (1) |
|
Understanding the Existing State |
|
|
6 | (1) |
|
|
7 | (3) |
|
|
10 | (1) |
|
Cloud Computing Service Categories |
|
|
11 | (1) |
|
|
11 | (1) |
|
Infrastructure as a Service |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
Cloud Computing Roles and Responsibilities |
|
|
15 | (1) |
|
Cloud Computing Reference Architecture |
|
|
16 | (2) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
Cloud Shared Considerations |
|
|
20 | (1) |
|
Security and Privacy Considerations |
|
|
20 | (1) |
|
Operational Considerations |
|
|
21 | (1) |
|
|
22 | (1) |
|
Machine Learning and Artificial Intelligence |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (2) |
|
|
30 | (5) |
|
Chapter 2 Data Classification |
|
|
35 | (28) |
|
Data Inventory and Discovery |
|
|
37 | (1) |
|
|
37 | (5) |
|
|
42 | (1) |
|
|
43 | (3) |
|
Information Rights Management |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (3) |
|
Data Audit and Audit Mechanisms |
|
|
53 | (2) |
|
Data Destruction/Disposal |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
57 | (2) |
|
|
59 | (4) |
|
Chapter 3 Cloud Data Security |
|
|
63 | (28) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
70 | (1) |
|
Cloud Storage Architectures |
|
|
71 | (1) |
|
|
71 | (1) |
|
Volume Storage: File-Based Storage and Block Storage |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
Designing and Applying Security Strategies for Storage |
|
|
74 | (1) |
|
|
74 | (3) |
|
|
77 | (1) |
|
|
77 | (1) |
|
Masking, Obfuscation, Anonymization, and Tokenization |
|
|
78 | (3) |
|
|
81 | (1) |
|
|
82 | (3) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (5) |
|
Chapter 4 Security in the Cloud |
|
|
91 | (30) |
|
Shared Cloud Platform Risks and Responsibilities |
|
|
92 | (2) |
|
Cloud Computing Risks by Deployment Model |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
95 | (2) |
|
|
97 | (4) |
|
|
101 | (1) |
|
Cloud Computing Risks by Service Model |
|
|
102 | (1) |
|
Infrastructure as a Service (IaaS) |
|
|
102 | (1) |
|
Platform as a Service (PaaS) |
|
|
102 | (1) |
|
Software as a Service (SaaS) |
|
|
103 | (1) |
|
|
103 | (2) |
|
|
105 | (2) |
|
Risk Mitigation Strategies |
|
|
107 | (3) |
|
Disaster Recovery (DR) and Business Continuity (BC) |
|
|
110 | (1) |
|
Cloud-Specific BIA Concerns |
|
|
110 | (1) |
|
Customer/Provider Shared BC/DR Responsibilities |
|
|
111 | (3) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (5) |
|
Chapter 5 Cloud Platform, Infrastructure, and Operational Security |
|
|
121 | (30) |
|
Foundations of Managed Services |
|
|
123 | (1) |
|
Cloud Provider Responsibilities |
|
|
124 | (1) |
|
Shared Responsibilities by Service Type |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
Securing Communications and Infrastructure |
|
|
126 | (1) |
|
|
127 | (1) |
|
Intrusion Detection/Intrusion Prevention Systems |
|
|
128 | (1) |
|
|
128 | (1) |
|
Vulnerability Assessment Tools |
|
|
128 | (1) |
|
|
129 | (1) |
|
Identity Assurance in Cloud and Virtual Environments |
|
|
130 | (1) |
|
Securing Hardware and Compute |
|
|
130 | (2) |
|
|
132 | (1) |
|
Third-Party Software Management |
|
|
133 | (1) |
|
Validating Open-Source Software |
|
|
134 | (1) |
|
OS Hardening, Monitoring, and Remediation |
|
|
134 | (1) |
|
|
135 | (2) |
|
Assessing Vulnerabilities |
|
|
137 | (1) |
|
Securing the Management Plane |
|
|
138 | (3) |
|
Auditing Your Environment and Provider |
|
|
141 | (1) |
|
Adapting Processes for the Cloud |
|
|
142 | (1) |
|
Planning for Cloud Audits |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (2) |
|
|
147 | (4) |
|
Chapter 6 Cloud Application Security |
|
|
151 | (40) |
|
Developing Software for the Cloud |
|
|
154 | (1) |
|
Common Cloud Application Deployment Pitfalls |
|
|
155 | (2) |
|
Cloud Application Architecture |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
Application Virtualization and Orchestration |
|
|
158 | (1) |
|
Application Programming Interfaces |
|
|
159 | (3) |
|
|
162 | (1) |
|
Supplemental Security Components |
|
|
162 | (2) |
|
Cloud-Secure Software Development Lifecycle (SDLC) |
|
|
164 | (1) |
|
Software Development Phases |
|
|
165 | (1) |
|
Software Development Models |
|
|
166 | (6) |
|
Cloud Application Assurance and Validation |
|
|
172 | (1) |
|
|
172 | (2) |
|
Common Threats to Applications |
|
|
174 | (1) |
|
Quality Assurance and Testing Techniques |
|
|
175 | (2) |
|
Supply Chain Management and Licensing |
|
|
177 | (1) |
|
Identity and Access Management |
|
|
177 | (1) |
|
Cloud Identity and Access Control |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
Federated Identity Management |
|
|
180 | (1) |
|
Multifactor Authentication |
|
|
181 | (1) |
|
|
182 | (1) |
|
Common Threats to Identity and Access Management in the Cloud |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (2) |
|
|
186 | (5) |
|
Chapter 7 Operations Elements |
|
|
191 | (24) |
|
Designing a Secure Data Center |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
194 | (2) |
|
Facilities and Redundancy |
|
|
196 | (4) |
|
|
200 | (1) |
|
|
201 | (1) |
|
Virtualization Operations |
|
|
202 | (3) |
|
|
205 | (2) |
|
Managing Security Operations |
|
|
207 | (1) |
|
Security Operations Center (SOC) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
211 | (4) |
|
Chapter 8 Operations Management |
|
|
215 | (30) |
|
Monitoring, Capacity, and Maintenance |
|
|
217 | (1) |
|
|
217 | (1) |
|
Physical and Environmental Protection |
|
|
218 | (1) |
|
|
219 | (5) |
|
Change and Configuration Management |
|
|
224 | (1) |
|
|
224 | (2) |
|
|
226 | (2) |
|
Release and Deployment Management |
|
|
228 | (1) |
|
Problem and Incident Management |
|
|
229 | (1) |
|
IT Service Management and Continual Service Improvement |
|
|
229 | (2) |
|
Business Continuity and Disaster Recovery |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (2) |
|
|
234 | (1) |
|
|
235 | (2) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
239 | (2) |
|
|
241 | (4) |
|
Chapter 9 Legal and Compliance Issues |
|
|
245 | (50) |
|
Legal Requirements and Unique Risks in the Cloud Environment |
|
|
247 | (1) |
|
|
247 | (2) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
U.S. Privacy and Security Laws |
|
|
255 | (1) |
|
Health Insurance Portability and Accountability Act |
|
|
255 | (3) |
|
The Health Information Technology for Economic and Clinical Health Act |
|
|
258 | (1) |
|
|
259 | (2) |
|
|
261 | (1) |
|
State Data Breach Notification Laws |
|
|
261 | (2) |
|
|
263 | (1) |
|
European Union General Data Protection Regulation |
|
|
263 | (4) |
|
|
267 | (1) |
|
U.S.-EU Safe Harbor and Privacy Shield |
|
|
267 | (2) |
|
Laws, Regulations, and Standards |
|
|
269 | (1) |
|
Payment Card Industry Data Security Standard |
|
|
270 | (1) |
|
Critical Infrastructure Protection Program |
|
|
270 | (1) |
|
Conflicting International Legislation |
|
|
270 | (2) |
|
Information Security Management Systems |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
Generally Accepted Privacy Principles |
|
|
273 | (6) |
|
|
279 | (1) |
|
Direct and Indirect Identifiers |
|
|
279 | (1) |
|
Privacy Impact Assessments |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
281 | (1) |
|
Cloud Forensic Challenges |
|
|
281 | (1) |
|
Collection and Acquisition |
|
|
282 | (1) |
|
Evidence Preservation and Management |
|
|
283 | (1) |
|
|
283 | (1) |
|
Audit Processes, Methodologies, and Cloud Adaptations |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
Restrictions of Audit Scope Statements |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
286 | (2) |
|
|
288 | (1) |
|
|
288 | (2) |
|
|
290 | (5) |
|
Chapter 10 Cloud Vendor Management |
|
|
295 | (40) |
|
The Impact of Diverse Geographical Locations and Legal Jurisdictions |
|
|
297 | (1) |
|
Security Policy Framework |
|
|
298 | (1) |
|
|
298 | (2) |
|
|
300 | (2) |
|
|
302 | (1) |
|
|
303 | (1) |
|
Exceptions and Compensating Controls |
|
|
304 | (1) |
|
|
305 | (1) |
|
Enterprise Risk Management |
|
|
306 | (2) |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
309 | (4) |
|
Risk Treatment and Response |
|
|
313 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (2) |
|
Enterprise Risk Management |
|
|
318 | (1) |
|
Assessing Provider Risk Management Practices |
|
|
318 | (1) |
|
Risk Management Frameworks |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
321 | (1) |
|
|
321 | (2) |
|
|
323 | (1) |
|
|
324 | (1) |
|
Common Contract Provisions |
|
|
324 | (2) |
|
|
326 | (1) |
|
Government Cloud Standards |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
Manage Communication with Relevant Parties |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
330 | (5) |
|
Appendix Answers to the Review Questions |
|
|
335 | (20) |
|
Chapter 1 Architectural Concepts |
|
|
336 | (1) |
|
Chapter 2 Data Classification |
|
|
337 | (2) |
|
Chapter 3 Cloud Data Security |
|
|
339 | (2) |
|
Chapter 4 Security in the Cloud |
|
|
341 | (2) |
|
Chapter 5 Cloud Platform, Infrastructure, and Operational Security |
|
|
343 | (2) |
|
Chapter 6 Cloud Application Security |
|
|
345 | (2) |
|
Chapter 7 Operations Elements |
|
|
347 | (2) |
|
Chapter 8 Operations Management |
|
|
349 | (1) |
|
Chapter 9 Legal and Compliance Issues |
|
|
350 | (2) |
|
Chapter 10 Cloud Vendor Management |
|
|
352 | (3) |
Index |
|
355 | |