Skip to main content

Planning for Alternative Networks: Cloud Security and Zero Trust

  • Chapter
  • First Online:
Information Security Planning
  • 429 Accesses

Abstract

This chapter discusses alternative network configurations: cloud computing and the advanced network configuration: zero trust. The vast majority of organizations use one or more cloud systems and many may implement much of their IT systems on a cloud, passing control of security to another entity.  However, security in the cloud is a shared responsibility with the client assuming partial aspects and liability. An emerging secure network is the zero trust architecture, which implements dynamically managed security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ardagna CA, Asal R, Damiani E, Vu QH (2015) From security to assurance in the cloud: a survey. ACM Computing Surveys 48(1):2.1–2.50

    Article  Google Scholar 

  2. Baginda YP, Affandi A, Pratomo I (2018) Analysis of RTO and RPO of a service stored on Amazon Web Service (AWS) and Google Cloud Engine (GCE). In: 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE), Inst. Electrical & Electronic Eng. (IEEE), http://ieeexplore.ieee.org, pp 418–422

  3. Behl A, Behl K (2012) Security paradigms for cloud computing. In: Fourth international conference on computational intelligence, communication systems and networks. IEEE Computer Society, Inst. Electrical & Electronics Eng. (IEEE), http://ieeexplore.ieee.org, pp 200–205

  4. Bird J, Johnson E (2021) A SANS survey: rethinking the Sec in DevSecOps: Security as Code, SANS Institute, June 2021

    Google Scholar 

  5. Cichonski P, Millar T, Grance T, Scarfone K (2012) NIST special publication (SP) 800-61 computer security incident handling guide, Rev. 2. Aug 2012. National Institute of Standards and Technology, pp 261–262

    Google Scholar 

  6. Cloud Security Alliance (2021) Security guidance for critical areas of focus in cloud computing, Version 4.0. https://cloudsecurityalliance.org/download/security-guidance-v4/

    Google Scholar 

  7. Easttom C (2019) System forensics, investigation, and response, 3rd edn. Jones & Bartlett Learning, Burlington

    Google Scholar 

  8. IBM (2021) Cost of a data breach report 2021. IBM

    Google Scholar 

  9. ISACA (2020) CDPSE review manual. ISACA, Schaumberg

    Google Scholar 

  10. Krutz RL (2010) Cloud security: a comprehensive guide to secure cloud computing. Wiley, Hoboken, p 2, 39–45

    Google Scholar 

  11. Messier R (2017) Network forensics. Wiley, Indianapolis

    Book  Google Scholar 

  12. Perlroth N, Shane S (2013) As FBI pursued snowden, an e-mail service stood firm. New York Times, Oct. 2, 2013

    Google Scholar 

  13. Rose S, Borchert O, Mitchell S, Connelly S (2020) NIST special publication 800-207 zero trust architecture. National Institute of Standards and Technology (NIST), Gaithersburg

    Book  Google Scholar 

  14. Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang DH, Mohaisen D (2020) Exploring the attack surface of Blockchain: a comprehensive survey. IEEE Commun Surv Tutor 22(3, 3rd Quarter 2020) 1977–2008.

    Google Scholar 

  15. Shackleford D (2021) A SANS survey: network security in the cloud. SANS Institute

    Google Scholar 

  16. Tang J, Cui Y, Li Q, Ren K, Liu J, Buyya R (2016) Ensuring security and privacy preservation for cloud data services. ACM Computing Surveys 49(1):Article 13. June 2016

    Google Scholar 

  17. Wagenseil P (2022) What is SASE? SC Magazine, Nov. 11, 2022. From: https://www.scmagazine.com/resource/cloud-security/what-is-sase

  18. Ruback H, Richards T (2021) Applying the AWS Shared Responsibility Model to your GxP Solution. 9 February 2021, Amazon. Taken 1/25/2023 from: https://aws.amazon.com/blogs/industries/applying-the-aws-sharedresponsibility-model-to-your-gxp-solution/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Susan Lincke .

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lincke, S. (2024). Planning for Alternative Networks: Cloud Security and Zero Trust. In: Information Security Planning. Springer, Cham. https://doi.org/10.1007/978-3-031-43118-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-43118-0_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-43117-3

  • Online ISBN: 978-3-031-43118-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics