Wednesday, July 17, 2013

NIST Cloud Computing Security

In a somewhat timely release, given all the press about hacking into corporate and public sector databases, comes an updated reference architecture from NIST on cloud computing security

If you are doing a project to build a cloud, or to build cloud security for your enterprise, or if you use a cloud in your project, you might want to have your IT staff go through this document. It is rich with models and tradeoffs and recommendations.

As often the case with such government reports and recommendations, the first umpteen pages are government blah blah, but in the latter part of the document and the appendices, it gets down to business.

First up of real interest is the so-called reference architecture, complete with host of acronymns.
Then, a bit later comes the "security conservation principle" which in a few words says that no matter how you arrange the boxes, actors, and flows, security should be preserved.

There's 204 pages in this document, so I think I'll not review the whole document here, leaving it you and your staff to follow up.

Check out these books I've written in the library at Square Peg Consulting


  1. These are in fact wonderful ideas in cloud computing security. You have touched some good points here.

  2. This comment has been removed by a blog administrator.

  3. Great put Good stuff.All the topics were explained quickly understand for me.I am waiting for your next fantastic blog.Thanks for sharing.Any coures related details learn...
    Cloud Business Management Software suite | Business Management Software

  4. I want you to thank for your time of this wonderful read!!! I definately enjoy every little bit of it and I have you bookmarked to check out new stuff of your blog a must read blog! Security Services

  5. I think that thanks for the valuabe information and insights you have so provided here. home security cameras

  6. It has been just unfathomably liberal with you to give straightforwardly what precisely numerous people would've promoted for an eBook to wind up making some money for their end, basically given that you could have attempted it in the occasion you needed.
    Cloud Business Management Software Suite

  7. breach the security Awesome article, it was exceptionally helpful! I simply began in this and I'm becoming more acquainted with it better! Cheers, keep doing awesome!