SHARE
Facebook X Pinterest WhatsApp

Challenging Security Requirements for U.S. Government Cloud Computing Adoption

Challenging Security Requirements for U.S. Government Cloud Computing Adoption Use the requirements, examples and subsequent mitigation strategies in this NIST document to address any cloud security concerns within your own organization. In order to achieve adoption of cloud computing for the federal government, it is necessary to address the security and privacy concerns that federal […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Mar 8, 2013

Challenging Security Requirements for U.S. Government Cloud Computing Adoption

Use the requirements, examples and subsequent mitigation strategies in this NIST document to address any cloud security concerns within your own organization.


In order to achieve adoption of cloud computing for the federal government, it is necessary to address the security and privacy concerns that federal agencies have when migrating their services to a cloud environment. To further exacerbate the situation, there are few documented details that directly address how to achieve some security aspects in a cloud environment.

The purpose of this document is to provide an overview of the high-priority security and privacy challenges perceived by federal agencies as impediments to the adoption of cloud computing. The document provides descriptions of the existing mitigations to these security and privacy impediments. If no mitigations are listed, then ongoing efforts that could lead to mitigations are described. In the cases where no ongoing efforts were identified, the document makes recommendations for possible mitigation or references existing best practices.

Use the requirements, examples and subsequent mitigation strategies in this NIST document to address any cloud security concerns within your own organization.

The attached zip file includes:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Challenging Security Requirements for Cloud Adoption.pdf

Recommended for you...

Best Cloud Security Solutions
Aminu Abdullahi
Jun 24, 2022
Strategies for Successful Data Migration
Kashyap Vyas
May 25, 2022
Leveraging AI to Secure CloudOps as Threat Surfaces Grow
ITBE Staff
May 20, 2022
The Emergence of Confidential Computing
Tom Taulli
Apr 20, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.