Wednesday, July 17, 2013

NIST Cloud Computing Security



In a somewhat timely release, given all the press about hacking into corporate and public sector databases, comes an updated reference architecture from NIST on cloud computing security

If you are doing a project to build a cloud, or to build cloud security for your enterprise, or if you use a cloud in your project, you might want to have your IT staff go through this document. It is rich with models and tradeoffs and recommendations.

As often the case with such government reports and recommendations, the first umpteen pages are government blah blah, but in the latter part of the document and the appendices, it gets down to business.

First up of real interest is the so-called reference architecture, complete with host of acronymns.
Then, a bit later comes the "security conservation principle" which in a few words says that no matter how you arrange the boxes, actors, and flows, security should be preserved.

There's 204 pages in this document, so I think I'll not review the whole document here, leaving it you and your staff to follow up.


Check out these books I've written in the library at Square Peg Consulting

10 comments:

  1. These are in fact wonderful ideas in cloud computing security. You have touched some good points here.

    ReplyDelete
  2. This comment has been removed by a blog administrator.

    ReplyDelete
  3. Great blog.you put Good stuff.All the topics were explained briefly.so quickly understand for me.I am waiting for your next fantastic blog.Thanks for sharing.Any coures related details learn...
    Cloud Business Management Software suite | Business Management Software

    ReplyDelete
  4. I want you to thank for your time of this wonderful read!!! I definately enjoy every little bit of it and I have you bookmarked to check out new stuff of your blog a must read blog! Security Services

    ReplyDelete
  5. I think that thanks for the valuabe information and insights you have so provided here. home security cameras

    ReplyDelete
  6. It has been just unfathomably liberal with you to give straightforwardly what precisely numerous people would've promoted for an eBook to wind up making some money for their end, basically given that you could have attempted it in the occasion you needed.
    Cloud Business Management Software Suite

    ReplyDelete
  7. breach the security Awesome article, it was exceptionally helpful! I simply began in this and I'm becoming more acquainted with it better! Cheers, keep doing awesome!

    ReplyDelete
  8. Sophisticated surveillance cameras are common place in premise security but 24 response app there is still a need for "human eyes" and many businesses do not have any real alternative to footing the bill for security guards.

    ReplyDelete
  9. I want to save my academic material , therefore , I was looking for a reliable and secure application for keeping save to my data. NIST could computing security system is very effective and can be trusted. Dissertation Writing Services

    ReplyDelete
  10. The other purpose behind leading this kind of affirmed PC penetrate is to prepare the IT work force to recognize these shortcomings all alone and to stay up with the latest on the most recent security programming. how to protect your data online

    ReplyDelete