Building the Infrastructure for Cloud Security
Book Details:
Pages: | 244 |
Published: | Mar 26 2014 |
Posted: | Nov 19 2014 |
Language: | English |
Book format: | PDF |
Book size: | 8.37 MB |
Book Description:
For cloud users and providers alike, security is an everyday concern, yetthere are very few books covering cloud security as a main subject. Thisbook will help address this information gap from an Information Technologysolution and usage-centric view of cloud infrastructure security. The bookhighlights the fundamental technology components necessary to buildand enable trusted clouds. Here also is an explanation of the security andcompliance challenges organizations face as they migrate mission-criticalapplications to the cloud, and how trusted clouds, that have their integrityrooted in hardware, can address these challenges.This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.'A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can't afford to ignore it!' -Vince Lubsey, Vice President, ProductDevelopment, Virtustream Inc." Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed-but instead measured, attested, and limited according to least privilege principles." -John Skinner, Vice President, HyTrust Inc."Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud."-Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC CorporationWhat youll learnUsage models, hardware and software technology components to enable trusted clouds.Through solution architecture and descriptions, you willsee how to build and enable trusted cloud infrastructure.Who this book is for This book will influence Infrastructure, Application and solution architects along with CTOs and CIOs and make them aware of Cloud Security and how to approach it with real-world examples and case studies. Table of ContentsChapter 1: Cloud Computing BasicsChapter 2: The Trusted Cloud:Addressing Security and ComplianceChapter 3: Platform Boot Integrity: Foundation for Trusted Compute PoolsChapter 4: Attestation: Proving TrustabilityChapter 5: Boundary Control in the Cloud: Geo-Tagging and Asset TaggingChapter 6: Network Security in the CloudChapter 7: Identity Management and Control for CloudsChapter 8: Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the CloudChapter 9: A Reference Design for Secure Cloud Bursting
Choosing the Best Cloud Adoption Strategy for Your Business
'This book successfully addresses the approach for adopting cloud into organizations (small and large), realizing that every application may not be a fit for a cloud environment. The writer does an excellent job of integrating cloud into the approach for an enterprise architecture and drilling down into how to evaluate cloud in its variety of implementation techniques, along with the benefits and drawbacks of each.'- Sue Miller-Sylvia, IBM Fellow and Vice President, Application Innovation Services, IBM Global Business Services Make the Right Cloud Adoption and Deployment Decisions for Your Business This is the first complete guide to cloud decision making for senior executives in both technology and non-technology roles. IBM Global Business Service...
Design Decisions for Cloud Computing Service Models SaaS, PaaS and IaaS
An expert guide to selecting the right cloud service model for your businessCloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and technology requirements.Guides corporations through key cloud design considerationsDiscusses the pros and cons of each cloud service modelHighlights major design co...
Transform Your Business Using Social Media, Mobile Internet and Cloud Computing
Fully exploit new conditions and opportunities created by current technological changes The combined impact of social technologies, the mobile Internet, and cloud computing are creating incredible new business opportunities. They are also destroying unprepared companies, transforming industries, and leaving behind workers who are unwilling or unable to adapt. Business Models for the Social Mobile Cloud reveals a compelling view from PwC of how the social mobile cloud and a combination of new technology changes are key players in a digital transformation in business and society that is moving more quickly and cutting more deeply than any technology transformation ever seen. Explores a road map to success through adapting to technological changes ...
2007 - 2021 © eBooks-IT.org