applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.
This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT); Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud; OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud; A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.
Table of contents
- Cloud Computing Basics
- The Trusted Cloud: Addressing Security and Compliance
- Platform Boot Integrity: Foundation for Trusted Compute Pools
- Attestation: Proving Trustability
- Boundary Control in the Cloud: Geo-Tagging and Asset Tagging
- Network Security in the Cloud
- Identity Management and Control for Clouds
- Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud
- A Reference Design for Secure Cloud Bursting
Pages : | 240 |
Size : | 8.6 MB |
Downloads: | 81 |
Created: | 2022-02-01 |
License: | CC BY-NC-ND |
Author(s): | by Raghu Yeluri, Enrique Castro-Leon |
Others related eBooks about Building the Infrastructure for Cloud Security
Web application security may seem like a complex, daunting task. This book is a quick guide to understanding how to make your website secure. It surveys the best steps for establishing a regular program to quickly find vulnerabilities in your site with a web application scanner.
Download free course Security Infrastructure Technology for Integrated Utilization of Big Data, pdf file on 171 pages by Atsuko Miyaji, Tomoaki Mimoto.
Download free course Demystifying Internet of Things Security, pdf file on 488 pages by Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler.
Break down the misconceptions of the Internet of Things by examining the different securit..., download free Internet of Things Security tutorial in PDF (488 pages) created by Sunil Cheruvu .
Gone are the days when it was acceptable for a piece of software to live in its own little..., download free API Security tutorial in PDF (205 pages) created by .