000 08214cam a2200757Ia 4500
001 ocn747412460
003 OCoLC
005 20171116112940.0
006 m o d
007 cr cn|||||||||
008 110418s2011 njua ob 001 0 eng d
020 _a9781118269091
_q(electronic bk.)
020 _a1118269098
_q(electronic bk.)
020 _a9781118116036
_q(electronic bk.)
020 _a1118116038
_q(electronic bk.)
020 _a9781118116043
_q(electronic bk.)
020 _a1118116046
_q(electronic bk.)
020 _a9781118116029
_q(electronic bk.)
020 _a111811602X
_q(electronic bk.)
020 _z9780470874745
_q(print)
020 _z0470874740
_q(print)
029 1 _aAU@
_b000053396245
029 1 _aCHNEW
_b000607104
029 1 _aDEBBG
_bBV041167590
029 1 _aDEBBG
_bBV041558921
029 1 _aDEBBG
_bBV042032057
029 1 _aDEBSZ
_b372700403
029 1 _aDEBSZ
_b414175247
029 1 _aDKDLA
_b820120-katalog:000588414
029 1 _aNZ1
_b14693208
035 _a(OCoLC)747412460
_z(OCoLC)821030850
_z(OCoLC)876268681
037 _aCL0500000409
_bSafari Books Online
037 _aF889EE2A-CF12-4647-85E0-03258F227FC1
_bOverDrive, Inc.
_nhttp://www.overdrive.com
040 _aE7B
_beng
_epn
_cE7B
_dOCLCQ
_dYDXCP
_dWAU
_dCDX
_dN$T
_dB24X7
_dDG1
_dTEFOD
_dREDDC
_dOCLCQ
_dDEBSZ
_dOCLCQ
_dDKDLA
_dOCLCO
_dUMI
_dDEBBG
_dOCLCO
_dNLGGC
_dTEFOD
_dEBLCP
_dOCLCQ
_dOCLCO
_dOCLCQ
_dDG1
_dELW
049 _aMAIN
050 4 _aHF5548.37
_b.A93 2011eb
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_222
245 0 0 _aAuditing cloud computing : a security and privacy guide /
_c[edited by] Ben Halpert.
_h[electronic resource]
260 _aHoboken, N.J. :
_bJohn Wiley & Sons,
_c©2011.
300 _a1 online resource (xvi, 206 pages) :
_billustrations.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _a[Wiley corporate F & A] ;
_v21
504 _aIncludes bibliographical references and index.
505 0 _aPreface xiii Chapter 1: Introduction to Cloud Computing 1 History 1 Defining Cloud Computing 2 Elasticity 2 Multitenancy 3 Economics 3 Abstraction 3 Cloud Computing Services Layers 4 Infrastructure as a Service 5 Platform as a Service 5 Software as a Service 6 Roles in Cloud Computing 6 Consumer 6 Provider 6 Integrator 7 Cloud Computing Deployment Models 8 Private 8 Community 8 Public 9 Hybrid 9 Challenges 9 Availability 10 Data Residency 10 Multitenancy 11 Performance 11 Data Evacuation 12 Supervisory Access 12 In Summary 13 Chapter 2: Cloud-Based IT Audit Process 15 The Audit Process 16 Control Frameworks for the Cloud 18 ENISA Cloud Risk Assessment 20 FedRAMP 20 Entities Using COBIT 21 CSA Guidance 21 CloudAudit/A6 -- The Automated Audit, Assertion, Assessment, and Assurance API 22 Recommended Controls 22 Risk Management and Risk Assessment 26 Risk Management 27 Risk Assessment 27 Legal 28 In Summary 29 Chapter 3: Cloud-Based IT Governance 33 Governance in the Cloud 36 Understanding the Cloud 36 Security Issues in the Cloud 37 Abuse and Nefarious Use of Cloud Computing 38 Insecure Application Programming Interfaces 39 Malicious Insiders 39 Shared Technology Vulnerabilities 39 Data Loss/Leakage 40 Account, Service, and Traffic Hijacking 40 Unknown Risk Profile 40 Other Security Issues in the Cloud 41 Governance 41 IT Governance in the Cloud 44 Managing Service Agreements 44 Implementing and Maintaining Governance for Cloud Computing 46 Implementing Governance as a New Concept 46 Preliminary Tasks 46 Adopt a Governance Implementation Methodology 48 Extending IT Governance to the Cloud 49 In Summary 52 Chapter 4: System and Infrastructure Lifecycle Management for the Cloud 57 Every Decision Involves Making a Tradeoff 57 Example: Business Continuity/Disaster Recovery 59 What about Policy and Process Collisions? 60 The System and Management Lifecycle Onion 61 Mapping Control Methodologies onto the Cloud62 Information Technology Infrastructure Library 63 Control Objectives for Information and Related Technology 64 National Institute of Standards and Technology 65 Cloud Security Alliance 66 Verifying Your Lifecycle Management 67 Always Start with Compliance Governance 67 Verification Method 68 Illustrative Example 70 Risk Tolerance 72 Special Considerations for Cross-Cloud Deployments 73 The Cloud Provider's Perspective 74 Questions That Matter 75 In Summary 76 Chapter 5: Cloud-Based IT Service Delivery and Support 79 Beyond Mere Migration 80 Architected to Share, Securely 80 Single-Tenant Offsite Operations (Managed Service Providers) 81 Isolated-Tenant Application Services (Application Service Providers) 81 Multitenant (Cloud) Applications and Platforms 82 Granular Privilege Assignment 82 Inherent Transaction Visibility 84 Centralized Community Creation 86 Coherent Customization 88 The Question of Location 90 Designed and Delivered for Trust 91 Fewer Points of Failure91 Visibility and Transparency 93 In Summary 93 Chapter 6: Protection and Privacy of Information Assets in the Cloud 97 The Three Usage Scenarios 99 What Is a Cloud? Establishing the Context -- Defining Cloud Solutions and their Characteristics 100 What Makes a Cloud Solution? 101 Understanding the Characteristics 104 Service Based 104 On-Demand Self-Service 104 Broad Network Access 104 Scalable and Elastic 105 Unpredictable Demand 105 Demand Servicing 105 Resource Pooling 105 Managed Shared Service 105 Auditability 105 Service Termination and Rollback 106 Charge by Quality of Service and Use 106 Capability to Monitor and Quantify Use 106 Monitor and Enforce Service Policies 107 Compensation for Location Independence 107 Multitenancy 107 Authentication and Authorization 108 Confidentiality 108 Integrity 108 Authenticity 108 Availability 108 Accounting and Control 109 Collaboration Oriented Architecture 109 Federated Access and ID Management 10.
520 _a"The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment. Many organizations are reporting or projecting a significant cost savings through the use of cloud computing--utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. Provides necessary guidance to ensure auditors address security and privacy aspects that through a proper audit can provide a specified level of assurance for an organization's resources. Reveals effective methods for evaluating the security and privacy practices of cloud services. A cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA). Timely and practical, Auditing Cloud Computing expertly provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers"--
_cProvided by publisher.
588 0 _aPrint version record.
650 0 _aBusiness enterprises
_xComputer networks
_xSecurity measures.
650 0 _aCloud computing
_xSecurity measures.
650 0 _aInformation technology
_xSecurity measures.
650 0 _aData protection.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
655 4 _aElectronic books.
655 7 _aElectronic books.
_2local
700 1 _aHalpert, Ben,
_d1986-
776 0 8 _iPrint version:
_tAuditing cloud computing.
_dHoboken, N.J. : Wiley, ©2011
_z9780470874745
_w(DLC) 2011016626
_w(OCoLC)698587265
830 0 _aWiley corporate F & A ;
_v21.
856 4 0 _uhttp://onlinelibrary.wiley.com/book/10.1002/9781118269091
_zWiley Online Library
942 _2ddc
_cBK
999 _c205241
_d205241