Abstract
This chapter discusses alternative network configurations: cloud computing and the advanced network configuration: zero trust. The vast majority of organizations use one or more cloud systems and many may implement much of their IT systems on a cloud, passing control of security to another entity. However, security in the cloud is a shared responsibility with the client assuming partial aspects and liability. An emerging secure network is the zero trust architecture, which implements dynamically managed security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ardagna CA, Asal R, Damiani E, Vu QH (2015) From security to assurance in the cloud: a survey. ACM Computing Surveys 48(1):2.1–2.50
Baginda YP, Affandi A, Pratomo I (2018) Analysis of RTO and RPO of a service stored on Amazon Web Service (AWS) and Google Cloud Engine (GCE). In: 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE), Inst. Electrical & Electronic Eng. (IEEE), http://ieeexplore.ieee.org, pp 418–422
Behl A, Behl K (2012) Security paradigms for cloud computing. In: Fourth international conference on computational intelligence, communication systems and networks. IEEE Computer Society, Inst. Electrical & Electronics Eng. (IEEE), http://ieeexplore.ieee.org, pp 200–205
Bird J, Johnson E (2021) A SANS survey: rethinking the Sec in DevSecOps: Security as Code, SANS Institute, June 2021
Cichonski P, Millar T, Grance T, Scarfone K (2012) NIST special publication (SP) 800-61 computer security incident handling guide, Rev. 2. Aug 2012. National Institute of Standards and Technology, pp 261–262
Cloud Security Alliance (2021) Security guidance for critical areas of focus in cloud computing, Version 4.0. https://cloudsecurityalliance.org/download/security-guidance-v4/
Easttom C (2019) System forensics, investigation, and response, 3rd edn. Jones & Bartlett Learning, Burlington
IBM (2021) Cost of a data breach report 2021. IBM
ISACA (2020) CDPSE review manual. ISACA, Schaumberg
Krutz RL (2010) Cloud security: a comprehensive guide to secure cloud computing. Wiley, Hoboken, p 2, 39–45
Messier R (2017) Network forensics. Wiley, Indianapolis
Perlroth N, Shane S (2013) As FBI pursued snowden, an e-mail service stood firm. New York Times, Oct. 2, 2013
Rose S, Borchert O, Mitchell S, Connelly S (2020) NIST special publication 800-207 zero trust architecture. National Institute of Standards and Technology (NIST), Gaithersburg
Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang DH, Mohaisen D (2020) Exploring the attack surface of Blockchain: a comprehensive survey. IEEE Commun Surv Tutor 22(3, 3rd Quarter 2020) 1977–2008.
Shackleford D (2021) A SANS survey: network security in the cloud. SANS Institute
Tang J, Cui Y, Li Q, Ren K, Liu J, Buyya R (2016) Ensuring security and privacy preservation for cloud data services. ACM Computing Surveys 49(1):Article 13. June 2016
Wagenseil P (2022) What is SASE? SC Magazine, Nov. 11, 2022. From: https://www.scmagazine.com/resource/cloud-security/what-is-sase
Ruback H, Richards T (2021) Applying the AWS Shared Responsibility Model to your GxP Solution. 9 February 2021, Amazon. Taken 1/25/2023 from: https://aws.amazon.com/blogs/industries/applying-the-aws-sharedresponsibility-model-to-your-gxp-solution/
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lincke, S. (2024). Planning for Alternative Networks: Cloud Security and Zero Trust. In: Information Security Planning. Springer, Cham. https://doi.org/10.1007/978-3-031-43118-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-43118-0_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-43117-3
Online ISBN: 978-3-031-43118-0
eBook Packages: Computer ScienceComputer Science (R0)