Secure Cloud Deployment, by McNab, Chris
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
- ISBN: 9780071798648 | 0071798641
- Cover: Paperback
- Copyright: 7/22/2013
Field-tested best practices and considerations for securely migrating data, apps, and services into the cloud Organized with network architects and network operations managers in mind, Secure Cloud Deploymentis geared towards those not yet in the cloud and/or only partially in who need a roadmap for planning and migrating securely into the cloud. The book also provides an essential spot-checking guide for those organizations already in the cloud but without airtight security. This practical guide is organized into three main sections: A Cloud Security Model, Inner Workings, and Operational Concerns. Part I details how secure networks are built today, features and concerns, a thorough analysis of cloud solution providers (Amazon, Salesforce, Microsoft, etc.), and consideration for moving applications and services into the cloud. Part II details the more technical inner workings of securing data in the cloud, including attack surface reduction, storage, hypervisors, engineering, and best practices for adding to and tailoring cloud systems. Part III goes into the important operational and upkeep concerns, responding to and documenting incidents regarding the cloud, and efficiencies for ongoing maintenance. Secure Cloud Deployment Delivers best practices rooted in successful, secure migrations implemented for high-profile customers, including Netflix, Amazon, Zynga, and more Explains how to deploy securely into the cloud, how to manage that deployment, and how to react to issues when they arise Reveals where data actually goes and how it's stored there, as well as the new cloud equivalents for functionalities that previously existed on a physical network Provides thorough explanations of cloud services, such as Amazon, Salesforce, Microsoft, and others--as well as the kinds of APIs that can be built to work with them Shows how to build additional wrap-around services and security features for more complex control, reporting, and system efficiencies