This book provides a comprehensive look at the various facets of cloud security – infrastructure, network, services, Compliance and users.
It will provide real world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a security perspective.
Table of contents (9 chapters)
About this book
applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.
This book provides:
- Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
- Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
- OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
- A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.
"A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc.
" Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc.
"Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
About the authors
Book Title: Building the Infrastructure for Cloud Security
Book Subtitle: A Solutions View
Authors: Raghu Yeluri, Enrique Castro-Leon
Publisher: Apress Berkeley, CA
eBook Packages: Professional and Applied Computing, Professional and Applied Computing (R0), Apress Access Books
Copyright Information: Raghuram Yeluri and Enrique Castro-Leon 2014
License: CC BY-NC
Softcover ISBN: 978-1-4302-6145-2Published: 31 March 2014
eBook ISBN: 978-1-4302-6146-9Published: 29 March 2014
Edition Number: 1
Number of Pages: XXVI, 244
Number of Illustrations: 95 b/w illustrations
Topics: Data and Information Security, Cryptology