Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
暫譯: 建立雲端安全基礎設施:解決方案視角(網路安全專家之聲)

Raghuram Yeluri

相關主題

商品描述

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:

  • Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  • Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  • OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
  • A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

"A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc.

" Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc.

"Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation

商品描述(中文翻譯)

對於雲端使用者和提供者來說,安全性是日常關注的議題,但專門探討雲端安全的書籍卻寥寥無幾。本書將從資訊科技解決方案和使用為中心的觀點,幫助填補雲端基礎設施安全方面的信息空白。書中強調了建立和啟用可信雲所需的基本技術組件。此外,還解釋了組織在將關鍵任務應用程式遷移到雲端時所面臨的安全性和合規性挑戰,以及如何利用根植於硬體的可信雲來應對這些挑戰。

本書提供:

- 使用案例和解決方案參考架構,以利用 Intel Trusted Execution Technology (TXT) 來實現基礎設施的完整性和建立可信池。
- 雲端中的可信地理位置管理,實現工作負載和數據位置的合規性及邊界控制使用。
- 基於 OpenStack 的參考架構,實現租戶控制的虛擬機和工作負載保護。
- 一個參考設計,以實現安全的混合雲,適用於雲端爆發的使用案例,為組織提供基礎設施的可見性和控制。

「一本對下一代雲端安全和基於硬體的信任根源的寶貴指南。不僅解釋了什麼和如何,更解釋了為什麼。而且為什麼你無法忽視它!」— **Vince Lubsey, 副總裁, 產品開發, Virtustream Inc.**

「Raghu 提供了一個有價值的參考,針對新的「由內而外」方法,在這種方法中,對硬體、軟體和特權使用者的信任從不被假設,而是根據最小特權原則進行測量、證明和限制。」— **John Skinner, 副總裁, HyTrust Inc.**

「傳統的基於參數的防禦在雲端中是不夠的。Raghu 的書正面解決了這個問題,通過強調獨特的使用模型來實現這個開放環境中的可信基礎設施。如果你在雲端中暴露,這是必讀之作。」— **Nikhil Sharma, 高級雲端解決方案總監, 首席技術官辦公室, EMC Corporation**