Index

Abstraction

Abuse of cloud computing

Access control

Accounting criteria and controls

Agile innovation

Amazon

American Recovery and Reinvestment Act (2009)

Anti-malware scanning

Application as a Service. See SaaS (Software as a Service)

Application programming interface (API)

Application servers

Application service providers

Atomic security continuum elements

Atomicity, principle of

Attestation of controls

Audit logs

Audit trail

Auditability

Auditors

audit process

business continuity and disaster recovery audit questions

challenges

control frameworks, use of

external

independent

role of in business continuity and disaster recovery planning

Audits

about

audit trail

automated

cloud architecture and traditional systems infrastructure differences

control frameworks

controls recommended

data access

and data storage

and deployment model

hypervisors

regulatory compliance

reports. See also SSAE 16 (Type II) audits

right to audit

risk assessment

risk management

scope of audit

and service model

standards

virtual machines

Authentication

Authenticity

Authorization

Autonomic response

Availability issues

Backups

Bechtel Corporation

Benchmarks, security

Best practices. See also Regulatory compliance; Standards

audits

COSO framework. See also COSO (Committee of Sponsoring Organizations of the Treadway Commission)

security benchmarks

and security design

Blobs

Botnets

BPaaS (Business Process as a Service)

Brokers

BS 25999 (British Standards Institute)

Business continuity. See also Disaster ...

Get Auditing Cloud Computing: A Security and Privacy Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.