Auditing Cloud Computing: A Security and Privacy Guide

Front Cover
John Wiley & Sons, Jul 5, 2011 - Business & Economics - 224 pages
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment

Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources.

  • Provides necessary guidance to ensure auditors address security and privacy aspects that through a proper audit can provide a specified level of assurance for an organization's resources
  • Reveals effective methods for evaluating the security and privacy practices of cloud services
  • A cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA)

Timely and practical, Auditing Cloud Computing expertly provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers.


What people are saying - Write a review

We haven't found any reviews in the usual places.


CloudBased IT Governance
Management for the Cloud
CloudBased IT Service Delivery and Support
The Question of Location
Assets in the Cloud
Lifecycle Management
Business Continuity and Disaster Recovery
Global Regulation and Cloud Computing
Cloud Morphing Shaping the Future
Cloud Storage
Cloud Computing Audit Checklist
About the Editor

Other editions - View all

Common terms and phrases

About the author (2011)

BEN HALPERT, CISSP, is an information security researcher and practitioner. He has keynoted and presented sessions at numerous conferences and was a contributing author to Readings and Cases in the Management of Information Security and the Encyclopedia of Information Ethics and Security. Halpert writes a monthly security column for Mobile Enterprise magazine as well as an IT blog ( He is also an adjunct instructor and on the advisory board of numerous colleges and universities.

Bibliographic information