Brainmatics

Cloud Computing Security

Banyak perusahaan beralih ke teknologi cloud computing yang sedang berkembang untuk menghemat dan menyimpan uang, keamanan merupakan suatu hal mendasar yang perlu diherpatikan. Kehilangan kontrol tertentu dan kurangnya kepercayaan membuat transisi ini sulit kecuali Anda tahu bagaimana menanganinya. Cloud menawarkan fleksibilitas, kemampuan adaptasi, skalabilitas, dan dalam kasus ketahanan keamanan.

Pada training ini akan digambarkan bagaimana kekuatan dan kelemahan dalam mengamankan informasi perusahaan Anda dengan pendekatan Cloud yang berbeda, dimana serangan-serangan itu biasanya fokus pada infrastruktur, jaringan komunikasi, data, atau layanan. Materi disajikan dengan framework yang jelas dan ringkas untuk mengamankan aset bisnis Anda saat membuat teknologi baru ini.

CONTENT

1.    Introduction to Cloud Computing and Security

    1.1 Understanding Cloud Computing
    1.2 The IT Foundation for Cloud
    1.3 The Bottom Line
    1.4 An Historical View: Roots of Cloud Computing
    1.5 A Brief Primer on Security: From 50,000 ft
    1.6 A Brief Primer on Architecture
    1.7 Security Architecture: A Brief Discussion
    1.8 Cloud Is Driving Broad Changes

2.    Cloud Computing Architecture

    2.1 Cloud Reference Architecture
    2.2 Control over Security in the Cloud Model
    2.3 Making Sense of Cloud Deployment
    2.4 Making Sense of Services Models
    2.5 How Clouds Are Formed and Key Examples
    2.6 Real-world Cloud Usage Scenarios

3.    Security Concerns, Risk Issues, and Legal Aspects

    3.1 Cloud Computing: Security Concerns
    3.2 Assessing The Risk Tolerance in Cloud Computing
    3.3 Legal and Regulatory Issues

4.    Securing the Cloud: Architecture

    4.1 Security Requirements for the Architecture
    4.2 Security Patterns and Architectural Elements
    4.3 Cloud Security Architecture
    4.4 Planning Key Strategies for Secure Operation

5.    Securing the Cloud: Data Security

    5.1 Overview of Data Security in Cloud Computing
    5.2 Data Encryption: Applications and Limits
    5.3 Cloud Data Security: Sensitive Data Categorization
    5.4 Cloud Data Storage
    5.5 Cloud Lock-in (the Roach Motel Syndrome)

6.    Securing the Cloud: Key Strategies and Best Practices

    6.1 Overall Strategy: Effectively Managing Risk
    6.2 Overview of Security Controls
    6.3 The Limits of Security Controls
    6.4 Best Practices
    6.5 Security Monitoring

7.    Security Criteria: Building an Internal Cloud

    7.1 Private Clouds: Motivation and Overview
    7.2 Security Criteria for Ensuring a Private Cloud

8.    Security Criteria: Selecting an External Cloud Provider

    8.1 Selecting a CSP: Overview of Assurance
    8.2 Selecting a CSP: Overview of Risks
    8.3 Selecting a CSP: Security Criteria

9.    Evaluating Cloud Security: An Information Security Framework

    9.1 Evaluating Cloud Security
    9.2 Checklists for Evaluating Cloud Security
    9.3 Metrics for the Checklists