- Cloud computing service models: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS)
- Public
- Private
- Virtual private
- Hybrid
- Establishing cyber security fundamentals
- Risk Analysis and Division of Responsibility
Cloud security risk management
- Dividing operational responsibility and visibility
- Retaining information security accountability
- Managing user authentication and authorization
Negotiating security requirements with vendors
- Identifying needed security measures
- Establishing a Service Level Agreement (SLA)
- Ensuring SLAs meet security requirements
- Securing the Cloud Infrastructure
Securing the platform
- Restricting network access through security groups
- Configuring platform-specific user access control
- Integrating cloud authentication/authorization systems
Compartmentalizing access to protect data confidentiality and availability
- Securing data in motion and data at rest
- Identifying your security perimeter
- Designing resilient cloud architectures
- Operating System and Network Security
Locking down cloud servers
- Scanning for and patching vulnerabilities
- Controlling and verifying configuration management
Leveraging provider-specific security options
- Defining security groups to control access
- Filtering traffic by port number
- Benefiting from the provider's built-in security
- Protecting archived data
- Achieving Security in a Private Cloud
Taking full responsibility for cyber security
- Managing the risks of public clouds
- Identifying and assigning security tasks in each SPI service model: SaaS, PaaS and IaaS
Selecting the appropriate product
- Comparing product-specific security features
- Organizational implementation requirements
Virtual Private Cloud (VPC)
- Simulating a private cloud in a public environment
- Google Secure Data Connector
- Amazon VPC
The hybrid cloud alternative
- Connecting on-premises data with cloud applications
- Securely bridging with VPC
- Expanding capacity to meet business surges
- Meeting Compliance Requirements
Managing cloud governance
- Retaining responsibility for the accuracy of the data
- Verifying integrity in stored and transmitted data
- Demonstrating due care and due diligence
Assuring compliance with government certification and accreditation regulations
- HIPAA
- Sarbanes-Oxley
- Data Protection Act
- PCI DSS
- Following standards for auditing information systems
- Negotiating third-party provider audits
- Preparing for Disaster Recovery
Implementing a plan to sustain availability
- Distributing data across the cloud to ensure availability and performance
- Addressing data portability and interoperability for a change in cloud providers
Exploiting the cloud for disaster recovery options
- Achieving cost-effective recovery time objectives
- Employing a strategy of redundancy to better resist DoS