Book description
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment
Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources.
Provides necessary guidance to ensure auditors address security and privacy aspects that through a proper audit can provide a specified level of assurance for an organization's resources
Reveals effective methods for evaluating the security and privacy practices of cloud services
A cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA)
Timely and practical, Auditing Cloud Computing expertly provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers.
Table of contents
- Cover
- Title Page
- Copyright
- Dedication
- Preface
- Chapter 1: Introduction to Cloud Computing
- Chapter 2: Cloud-Based IT Audit Process
- Chapter 3: Cloud-Based IT Governance
-
Chapter 4: System and Infrastructure Lifecycle Management for the Cloud
- Every Decision Involves Making a Tradeoff
- What about Policy and Process Collisions?
- The System and Management Lifecycle Onion
- Mapping Control Methodologies onto the Cloud
- Verifying Your Lifecycle Management
- Risk Tolerance
- Special Considerations for Cross-Cloud Deployments
- The Cloud Provider's Perspective
- In Summary
- Chapter 5: Cloud-Based IT Service Delivery and Support
-
Chapter 6: Protection and Privacy of Information Assets in the Cloud
- The Three Usage Scenarios
- What Is a Cloud? Establishing the Context—Defining Cloud Solutions and their Characteristics
- The Cloud Security Continuum and a Cloud Security Reference Model
- Cloud Characteristics, Data Classification, and Information Lifecycle Management
- Regulatory and Compliance Implications
- A Cloud Information Asset Protection and Privacy Playbook
- In Summary
- Chapter 7: Business Continuity and Disaster Recovery
- Chapter 8: Global Regulation and Cloud Computing
- Chapter 9: Cloud Morphing: Shaping the Future of Cloud Computing Security and Audit
- Appendix: Cloud Computing Audit Checklist
- About the Editor
- About the Contributors
- Index
Product information
- Title: Auditing Cloud Computing: A Security and Privacy Guide
- Author(s):
- Release date: August 2011
- Publisher(s): Wiley
- ISBN: 9780470874745
You might also like
book
Information Security A Practical Guide: Bridging the Gap between IT and Management
Information Security A Practical Guide - Bridging the gap between IT and management “One of the …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Securing Cloud Services - A pragmatic approach, second edition
Securing Cloud Services – A pragmatic guide gives an overview of security architecture processes and explains …
book
Information Security Law: The Emerging Standard for Corporate Compliance
Information Security Law: The Emerging Standard for Corporate Compliance is designed to help companies understand this …