Security Considerations for Cloud Computing

  • 44m
  • ISACA
  • ISACA
  • 2013

Another publication in the Cloud Computing Vision Series, Security Considerations for Cloud Computing presents practical guidance to facilitate the decision process for IT and business professionals concerning the decision to move to the cloud. It helps enable effective analysis and measurement of risk through use of decision trees and checklists outlining the security factors to be considered when evaluating the cloud as a potential solution.

There are five essential characteristics, three types of service models and four major deployment models taken into account relative to cloud computing. To ensure a common understanding of these models, this publication describes the characteristics of each characteristic and model.

This guide is meant for all current and potential cloud users who need to ensure protection of information assets moving to the cloud.

In this Book

  • Security Considerations for Cloud Computing
  • Introduction
  • Cloud Computing
  • Overview of Security Risk and Threats Related to Operating in the Cloud
  • The Path to the Decision and Beyond
  • The Path to the Decision and Beyond—Checklist
  • Overview of Different Risk Factors per Service and Deployment Model
  • Mapping Threats and Mitigating Actions to COBIT 5 for Information Security
  • Abbreviations
  • References

YOU MIGHT ALSO LIKE

Rating 4.6 of 86 users Rating 4.6 of 86 users (86)
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.6 of 59 users Rating 4.6 of 59 users (59)