Guidelines on Security and Privacy in Public Cloud Computing

    Guidelines on Security and Privacy in Public Cloud Computing

    Cloud computing has made access to computing resources a lot easier, but with that convenience has come a whole new universe of threats and vulnerabilities. These guidelines will help you evaluate and secure your cloud presence.

    Cloud computing has been defined by NIST as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing technologies can be implemented in a wide variety of architectures, under different service and deployment models, and can coexist with other technologies and software design approaches. The security challenges cloud computing presents, however, are formidable, especially for public clouds whose infrastructure and computational resources are owned by an outside party that sells those services to the general public.

    The emergence of cloud computing promises to have far-reaching effects on the systems and networks of federal agencies and other organizations. Many of the features that make cloud computing attractive, however, can also be at odds with traditional security models and controls. The primary purpose of this report is to provide an overview of public cloud computing and the security and privacy considerations involved. More specifically, this document describes the threats, technology risks and safeguards surrounding public cloud environments and their treatment.

    The attached Zip file includes:

    • Intro Page.doc
    • Cover Sheet and Terms.doc
    • Guidelines on Security and Privacy in Public Cloud Computing.pdf

    Latest Articles