Building the Infrastructure for cloud security A solutions View 1st edition by Raghuram Yeluri, Enrique Castro Leon – Ebook PDF Instant Download/Delivery. 1430261455 978-1430261452
Full download Building the Infrastructure for cloud security A solutions View 1st edition after payment

Product details:
ISBN 10: 1430261455
ISBN 13: 978-1430261452
Author: Raghuram Yeluri, Enrique Castro Leon
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical
applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.
This book provides:
- Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
- Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
- OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
- A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.
“A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!” —Vince Lubsey, Vice President, Product Development, Virtustream Inc.
” Raghu provides a valuable reference for the new ‘inside out’ approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles.” —John Skinner, Vice President, HyTrust Inc.
“Traditional parameter based defenses are in sufficient in the cloud. Raghu’s book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud.” —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
Building the Infrastructure for cloud security A solutions View 1st Table of contents:
Preface
- Introduction to Cloud Security
- Purpose of the Book
- Target Audience and Prerequisites
- How to Use This Book
Part 1: Introduction to Cloud Security Infrastructure
Chapter 1: Understanding Cloud Computing and Security Needs
- What is Cloud Computing?
- Key Characteristics of Cloud Environments (Scalability, Flexibility, and Multi-tenancy)
- Why Cloud Security Matters
- Common Security Threats in Cloud Environments
Chapter 2: Key Concepts in Cloud Security
- Confidentiality, Integrity, and Availability (CIA Triad)
- Shared Responsibility Model in Cloud Security
- Cloud Security Challenges: Data Breaches, Misconfigurations, and Insider Threats
- Introduction to Cloud Security Frameworks and Standards (ISO 27001, NIST, CSA)
Chapter 3: The Role of Infrastructure in Cloud Security
- Understanding Cloud Infrastructure: IaaS, PaaS, and SaaS
- The Importance of Secure Infrastructure Design
- The Relationship Between Infrastructure and Security in the Cloud
- Building Resilient Cloud Security Architectures
Part 2: Building Secure Cloud Infrastructure
Chapter 4: Designing Secure Cloud Network Architectures
- Cloud Network Design Principles for Security
- Segmenting and Isolating Cloud Networks
- Secure Connectivity (VPNs, Private Connections, etc.)
- Using Firewalls, Load Balancers, and Intrusion Detection Systems (IDS)
Chapter 5: Data Protection and Privacy in the Cloud
- Encrypting Data in Transit and at Rest
- Key Management and Encryption Standards
- Ensuring Compliance with Data Privacy Regulations (GDPR, CCPA, HIPAA)
- Data Loss Prevention (DLP) in Cloud Environments
Chapter 6: Identity and Access Management (IAM) in the Cloud
- IAM Overview and Key Components
- Multi-Factor Authentication (MFA) and Single Sign-On (SSO)
- Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC)
- Managing Privileged Access and Secrets Management
Chapter 7: Securing Cloud Infrastructure as Code
- Introduction to Infrastructure as Code (IaC) and its Security Implications
- Using IaC for Secure Cloud Deployments
- Automated Security Controls and Compliance as Code
- Best Practices for Securing Infrastructure Code (Terraform, CloudFormation, etc.)
Part 3: Cloud Security Operations
Chapter 8: Continuous Monitoring and Threat Detection
- Real-time Monitoring in Cloud Environments
- Log Management and Security Information and Event Management (SIEM)
- Threat Intelligence and Incident Response
- Using Machine Learning for Threat Detection and Prevention
Chapter 9: Managing Cloud Security Posture
- Cloud Security Posture Management (CSPM) Tools
- Continuous Configuration Monitoring and Risk Assessment
- Automating Security Compliance in the Cloud
- Preventing and Mitigating Misconfigurations
Chapter 10: Incident Response and Disaster Recovery
- Cloud Incident Response Strategies
- Detecting, Containing, and Recovering from Cloud Security Incidents
- Designing a Cloud Disaster Recovery Plan
- Business Continuity and High Availability in Cloud Environments
Part 4: Advanced Topics in Cloud Security Infrastructure
Chapter 11: Security for Hybrid and Multi-Cloud Environments
- Challenges and Best Practices for Multi-Cloud Security
- Securing Hybrid Cloud Infrastructure
- Integrating Cloud Security Across Different Cloud Providers
- Managing Identity and Access in Multi-Cloud Architectures
Chapter 12: Cloud Security Automation and Orchestration
- Automating Cloud Security Responses
- Security Orchestration, Automation, and Response (SOAR) in Cloud Environments
- Using Cloud-Native Security Tools for Automation
- The Role of AI and Machine Learning in Cloud Security Automation
Chapter 13: Compliance and Governance in Cloud Security
- Cloud Compliance Challenges and Solutions
- Ensuring Compliance with Regulatory Requirements
- Implementing Cloud Governance Policies
- Security Audits and Cloud Certifications (SOC 2, PCI DSS)
Part 5: Future of Cloud Security
Chapter 14: Emerging Trends in Cloud Security
- The Rise of Zero Trust Architecture in Cloud Security
- Security in Serverless and Edge Computing
- Securing Containers and Kubernetes in Cloud Environments
- The Impact of Quantum Computing on Cloud Security
Chapter 15: Building a Cloud Security Culture
- The Role of People in Cloud Security
- Building a Security-First Mindset in Cloud Teams
- Training and Awareness Programs for Cloud Security
- Collaboration Between Development, Operations, and Security Teams
Chapter 16: Looking Ahead: The Future of Cloud Security Infrastructure
- Evolving Threat Landscape in Cloud Computing
- Advancements in Cloud Security Technologies
- Best Practices for Future-Proofing Cloud Security Infrastructure
- Staying Ahead of Emerging Security Risks
Conclusion
- Recap of Key Insights and Strategies
- Next Steps for Building and Securing Your Cloud Infrastructure
- Resources for Ongoing Learning in Cloud Security
Appendices
- A. Cloud Security Tools and Resources
- B. Security Checklist for Cloud Infrastructure
- C. Glossary of Cloud Security Terms
References
Index
People also search for Building the Infrastructure for cloud security A solutions View 1st:
what is infrastructure security in cloud computing
cloud infrastructure security best practices
cloud infrastructure requirements
building cloud infrastructure
building a cloud security program