861 KB | 3 files | PDF, DOC
With the openness of Cloud Computing, security can't be an afterthought-it has to be built into the DNA of cloud applications from the outset. This book chapter covers the basics, whether your shop or a vendor is doing the coding.
In "Cloud Security: A Comprehensive Guide to Secure Cloud Computing," authors and security experts Ronald L. Krutz and Russell Dean Vines take a look at the advantages of cloud computing while outlining the security risks presented by these services.
Our excerpt comes from the first chapter, entitled "Cloud Computing Software Security Fundamentals." This chapter emphasizes the importance of building security measures into the software development life cycle for cloud computing, whether code is being created by the cloud provider or the customer.
Reprinted with permission of John Wiley & Sons, Inc., from Ronald L. Krutz and Russell Dean Vines' "Cloud Security: A Comprehensive Guide to Secure Cloud Computing," 2010.
The attached Zip file includes:
This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program. ... More >>
This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. ... More >>
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ... More >>