For cloud customers and suppliers alike, security is an regularly concern, however there are just a few books overlaying cloud security as a foremost matter. This book will help deal with this information gap from an Information Know-how reply and utilization-centric view of cloud infrastructure security. The book highlights the elementary technology parts important to assemble and permit trusted clouds. Proper right here can also be an proof of the security and compliance challenges organizations face as they migrate mission-important
functions to the cloud, and the method trusted clouds, which have their integrity rooted in hardware, can deal with these challenges.
This book gives: Use situations and reply reference architectures to permit infrastructure integrity and the creation of trusted swimming swimming pools leveraging Intel Trusted Execution Know-how (TXT). Trusted geo-location administration in the cloud, enabling workload and data location compliance and boundary administration usages in the cloud. OpenStack-based reference construction of tenant-managed digital machine and workload protection in the cloud. A reference design to permit protected hybrid clouds for a cloud bursting use case, providing infrastructure visibility and administration to organizations.
"A useful info to the subsequent period of cloud security and hardware based root of perception. Larger than an proof of the what and the means, is the rationalization of why. And why you probably can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Enchancment, Virtustream Inc.
" Raghu gives a worthwhile reference for the new 'inside out' technique, the place perception in hardware, software program, and privileged customers is not assumed—nevertheless instead measured, attested, and restricted in line with least privilege guidelines." —John Skinner, Vice President, HyTrust Inc.
"Typical parameter based defenses are in sufficient in the cloud. Raghu's book addresses this disadvantage head-on by highlighting distinctive utilization fashions to permit trusted infrastructure in this open environment. A ought to study in case you’re uncovered in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Firm
What youll learnUsage fashions, hardware and software program technology parts to permit trusted clouds.By means of reply construction and descriptions, you’ll discover strategies to assemble and permit trusted cloud infrastructure.
Who this book is for
This book will have an effect on Infrastructure, Software program and reply architects along with CTOs and CIOs and make them acutely aware of Cloud Security and the greatest method to technique it with precise-world examples and case analysis.
Desk of Contents
Chapter 1: Cloud Computing Fundamentals
Chapter 2: The Trusted Cloud: Addressing Security and Compliance
Chapter three: Platform Boot Integrity: Foundation for Trusted Compute Swimming swimming pools
Chapter 4: Attestation: Proving Trustability
Chapter 5: Boundary Administration in the Cloud: Geo-Tagging and Asset Tagging
Chapter 6: Group Security in the Cloud
Chapter 7: Id Administration and Administration for Clouds
Chapter eight: Trusted Digital Machines: Ensuring the Integrity of Digital Machines in the Cloud
Chapter 9: A Reference Design for Protected Cloud Bursting