SHARE
Facebook X Pinterest WhatsApp

NIST Provides Guidelines for Safe Cloud Computing Deployment

A recent survey shows that although cloud adoption is on the rise, a number of organizations have yet to adopt the platform in any form. GigaOM Research and North Bridge Venture Partners, in collaboration with 57 other organizations, compiled the third annual Future of Cloud Computing Survey, in which only 25 percent of respondents had […]

Written By
thumbnail
Kim Mays
Kim Mays
Oct 29, 2013

A recent survey shows that although cloud adoption is on the rise, a number of organizations have yet to adopt the platform in any form. GigaOM Research and North Bridge Venture Partners, in collaboration with 57 other organizations, compiled the third annual Future of Cloud Computing Survey, in which only 25 percent of respondents had not yet adopted cloud platforms in their companies. The top reason for lack of adoption or slowed adoption was considered to be security issues, as identified by 46 percent of those surveyed. 

For organizations that have yet to adopt cloud computing or that have only dabbled in cloud adoption via public cloud services, a recent publication by the National Institute of Standards and Technology (NIST) could help safely and efficiently move into the cloud. The document, “Cloud Computing: A Review of Features, Benefits, and Risks, and Recommendations for Secure, Efficient Implementations,” is available in our IT Downloads section.

In the document, NIST contributors define cloud computing characteristics, issues associated with its deployment, and models of deployment, including:

  • Private cloud
  • Community cloud
  • Public cloud
  • Hybrid cloud
  • On-site private cloud

Service models—IaaS, SaaS, and PaaS— of cloud computing are also discussed in detail, with consideration given to business objectives and jobs suited for each type.

Discussions on security delve into open issues and explanations of how to more securely deploy a cloud environment:

By imposing uniform management practices, cloud providers may be able to improve on some security update and response issues. Clouds, however, have the potential to aggregate private, sensitive information about customers in cloud data centers. Cloud providers must assure the subscriber that they can keep customer data isolated and protected. Since cloud users and administrators rely heavily on Web browsers, browser security failures can lead to cloud security breaches. The privacy and security of cloud computing depend primarily on whether the cloud service provider has implemented robust security controls and a sound privacy policy required by their customers.

The publication also discusses general information security and makes recommendations on risk management and data governance.

Both organizations currently deploying cloud environments and those that are considering doing so will benefit from this strategic text. It is filled with best practices and solid standards for instituting a cloud computing platform in most any size of organization.

Recommended for you...

Best Cloud Security Solutions
Aminu Abdullahi
Jun 24, 2022
Strategies for Successful Data Migration
Kashyap Vyas
May 25, 2022
Leveraging AI to Secure CloudOps as Threat Surfaces Grow
ITBE Staff
May 20, 2022
The Emergence of Confidential Computing
Tom Taulli
Apr 20, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.