Introduction. xxvi CHAPTER 1: Different Types of Cloud Models. 1 Cloud Deployment Models. 2 Cloud Service Models. 6 Advanced Cloud Services. 9 Cloud Shared Responsibility Model. 11 What Next?. 14 CHAPTER 2: Capacity Planning.
15 Requirements. 16 Standard Templates. 18 Licensing. 18 User Density. 20 System Load. 21 Trend Analysis. 21 Performance Capacity Planning. 22 What Next?.
24 CHAPTER 3: High Availability and Scaling in Cloud Environments. 25 Hypervisors. 26 Oversubscription. 28 Regions and Zones. 30 Applications. 32 Containers. 32 Clusters. 33 High Availability of Network Functions.
33 Avoid Single Points of Failure. 36 Scalability. 36 What Next?. 39 CHAPTER 4: Solution Design in Support of the Business Requirements. 41 Requirement Analysis. 42 Environments. 48 Testing Techniques. 50 What Next?.
53 CHAPTER 5: Identity and Access Management. 55 Identification and Authorization. 56 Directory Services. 60 Federation. 61 Certificate Management. 63 Multifactor Authentication (MFA). 64 Single Sign-On (SSO). 65 Public Key Infrastructure (PKI).
66 Secret Management. 67 Key Management. 67 What Next?. 69 CHAPTER 6: Secure a Network in a Cloud Environment. 71 Network Segmentation. 72 Protocols. 74 Network Services. 77 Log and Event Monitoring.
80 Network Flows. 80 Hardening and Configuration Changes. 81 What Next?. 86 CHAPTER 7: OS and Application Security Controls. 87 Policies. 88 User Permissions. 90 Antivirus/Antimalware/Endpoint Detection and Response (EDR). 93 Host-Based IDS (HIDS)/Host-Based IPS (HIPS).
94 Hardened Baselines. 94 File Integrity. 96 Log and Event Monitoring. 96 Configuration Management. 96 Builds. 96 Operating System (OS) Upgrades. 98 Encryption. 98 Mandatory Access Control.
99 Firewall Software. 100 What Next?. 101 CHAPTER 8: Data Security and Compliance Controls in Cloud Environments. 103 Encryption. 104 Integrity. 105 Classification. 107 Segmentation. 108 Access Control.
108 Impact of Laws and Regulations. 109 Records Management. 110 Data Loss Prevention (DLP). 111 Cloud Access Security Broker (CASB). 111 What Next?. 113 CHAPTER 9: Security Requirements. 115 Tools. 116 Vulnerability Assessment.
117 Security Patches. 118 Risk Register. 120 Prioritization of Patch Applications. 120 Deactivate Default Accounts. 120 Impacts of Security Tools on Systems and Services. 121 What Next?. 122 CHAPTER 10: Incident Response Procedures. 123 Preparation.
124 Incident Response Procedures. 130 What Next?. 134 CHAPTER 11: Integrate Components into a Cloud Solution. 135 Subscription Services. 136 Provisioning Resources. 140 Application. 142 Deploying Virtual Machines (VMs) and Custom Images. 143 Templates.
143 Identity Management. 145