Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

Raghuram Yeluri

相關主題

商品描述

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:

  • Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  • Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  • OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
  • A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

"A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc.

" Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc.

"Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation

商品描述(中文翻譯)

對於雲端使用者和提供者來說,安全性是日常關注的議題,但涵蓋雲端安全作為主要主題的書籍卻寥寥無幾。本書將從資訊科技解決方案和使用為中心的觀點,幫助填補雲端基礎設施安全的資訊空白。本書強調了建立和啟用可信雲所需的基本技術組件。這裡也解釋了組織在將關鍵任務應用程式遷移到雲端時所面臨的安全性和合規性挑戰,以及如何透過根植於硬體的可信雲來解決這些挑戰。

本書提供:

- 使用案例和解決方案參考架構,以啟用基礎設施完整性並利用 Intel Trusted Execution Technology (TXT) 創建可信池。
- 雲端中的可信地理位置管理,實現工作負載和數據位置的合規性及邊界控制使用。
- 基於 OpenStack 的租戶控制虛擬機和工作負載保護的參考架構。
- 一個參考設計,以實現安全的混合雲,適用於雲端爆發的使用案例,為組織提供基礎設施的可見性和控制。

「一本對下一代雲端安全和基於硬體的信任根源的寶貴指南。不僅解釋了什麼和如何,更解釋了為什麼。而且為什麼你無法忽視它!」— Vince Lubsey, 副總裁,產品開發,Virtustream Inc.

「Raghu 提供了一個有價值的參考,針對新的「由內而外」方法,在這種方法中,對硬體、軟體和特權使用者的信任從不被假設,而是根據最小特權原則進行測量、證明和限制。」— John Skinner, 副總裁,HyTrust Inc.

「傳統的基於參數的防禦在雲端中是不夠的。Raghu 的書正面解決了這個問題,突顯了在這個開放環境中啟用可信基礎設施的獨特使用模型。如果你在雲端中暴露,這是必讀之作。」— Nikhil Sharma, 高級雲端解決方案總監,CTO辦公室,EMC Corporation