The infrastructure, network, services, compliance, and user aspects of cloud security are all thoroughly covered in this book. In order to explain the actual and perceived risks and difficulties in implementing and managing services in a cloud architecture from a security perspective, it will give real-world case studies.
Security is a daily worry for both cloud customers and providers, but there aren't many books that focus primarily on cloud security. This book will contribute to filling this knowledge gap by approaching cloud infrastructure security from an IT solution and usage-centric perspective.
The key technological elements required to create and enable trusted clouds are highlighted in the book. Here is also an explanation of the security and compliance issues businesses have when moving mission-critical apps to the cloud, as well as how trusted clouds with hardware-based integrity may handle these issues.
- Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
- Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
- OpenStack-based reference architecture of the tenant-controlled virtual machine and workload protection in the cloud.
- A reference design to enable secure hybrid clouds for a cloud-bursting use case, providing infrastructure visibility and control to organizations.