𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cloud Security Auditing

✍ Scribed by Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi


Publisher
Springer International Publishing
Year
2019
Tongue
English
Leaves
174
Series
Advances in Information Security 76
Edition
1st ed. 2019
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers’ views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well.
This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime.
Many companies nowadays leverage cloud services for conducting major business operations (e.g., Web service, inventory management, customer service, etc.). However, the fear of losing control and governance still persists due to the inherent lack of transparency and trust in clouds. The complex design and implementation of cloud infrastructures may cause numerous vulnerabilities and misconfigurations, while the unique properties of clouds (elastic, self-service, multi-tenancy) can bring novel security challenges. In this book, the authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants’ trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactive auditing and novel (runtime and proactive) auditing techniques to serve different stakeholders in the cloud. This book covers security threats from different cloud abstraction levels and discusses a wide-range of security properties related to cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO 27017). It also elaborates on the integration of security auditing solutions into real world cloud management platforms (e.g., OpenStack, Amazon AWS and Google GCP).
This book targets industrial scientists, who are working on cloud or security-related topics, as well as security practitioners, administrators, cloud providers and operators.Researchers and advanced-level students studying and working in computer science, practically in cloud security will also be interested in this book.

✦ Table of Contents


Front Matter ....Pages i-xi
Introduction (Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.)....Pages 1-7
Literature Review (Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.)....Pages 9-16
Auditing Security Compliance of the Virtualized Infrastructure (Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.)....Pages 17-38
Auditing Virtual Network Isolation Across Cloud Layers (Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.)....Pages 39-70
User-Level Runtime Security Auditing for the Cloud (Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.)....Pages 71-102
Proactive Security Auditing in Clouds (Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.)....Pages 103-143
Runtime Security Policy Enforcement in Clouds (Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.)....Pages 145-156
Conclusion (Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar et al.)....Pages 157-159
Back Matter ....Pages 161-166

✦ Subjects


Computer Science; Security; Computer Systems Organization and Communication Networks; Information Systems and Communication Service; Communications Engineering, Networks


πŸ“œ SIMILAR VOLUMES


Auditing cloud computing: a security and
✍ Ben Halpert πŸ“‚ Library πŸ“… 2011 πŸ› Wiley 🌐 English

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environmentMany organizations are reporting or projecting a significant cost savings through the use of cloud computingβ€”utilizing shared computing resources to provide ubiquitous access for organizations and

Cloud Auditing Best Practices: Perform S
✍ Shinesa Cambric, Michael Ratemo πŸ“‚ Library πŸ“… 2023 πŸ› Packt Publishing 🌐 English

<p><span>Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to minimize security risks</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Leverage best practices and emerging technologies to effectively audit a cloud environment</span></span

Cloud Auditing Best Practices: Perform S
✍ Shinesa Cambric, Michael Ratemo πŸ“‚ Library πŸ“… 2023 πŸ› Packt Publishing 🌐 English

<p><span>Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to minimize security risks</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Leverage best practices and emerging technologies to effectively audit a cloud environment</span></span

Cloud Auditing Best Practices: Perform S
✍ Shinesa Cambric, Michael Ratemo πŸ“‚ Library πŸ› Packt Publishing 🌐 English

<p><span>Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to minimize security risks</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Leverage best practices and emerging technologies to effectively audit a cloud environment</span></span

Cloud Security
✍ Sirisha Potluri, Katta Subba Rao, Sachi Nandan Mohanty πŸ“‚ Library πŸ“… 2021 πŸ› De Gruyter 🌐 English
Cloud Security: A Comprehensive Guide to
✍ Ronald L. Krutz, Russell Dean Vines πŸ“‚ Library πŸ“… 2010 πŸ› Wiley 🌐 English

Well-known security experts decipher the most challenging aspect of cloud computing-securityCloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-a