Difference between revisions of "Book:Cloud Computing Security Handbook: Regulatory Compliance and Best Practices"

From LIMSWiki
Jump to navigationJump to search
(Updated so new print method will work)
Line 15: Line 15:
| text      = This book should not be considered complete until this message box has been removed. This is a work in progress.
| text      = This book should not be considered complete until this message box has been removed. This is a work in progress.
}}
}}
The goal of this handbook is to provide an overview of regulatory compliance and best practices in the field of [[cloud computing]]. This book is made available under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International] license.
The goal of this guide is to provide an overview of regulatory compliance and best practices in the field of [[cloud computing]]. This book is made available under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International] license.
 
;1. Introduction to Cloud Computing
;1. Introduction to Cloud Computing
:[[Cloud computing]]
:[[Cloud computing]]
:[[IEEE Cloud Computing]]
:[[IEEE Cloud Computing]]
:[[Service-level agreement]]
:[[Service-level agreement]]
;2. Regulatory Compliance and Standards
;2. Regulatory Compliance and Standards
:[[Legal aspects of computing]]
:[[Legal aspects of computing]]
 
:''United States law''
;''United States law''
 
:[[Children's Online Privacy Protection Act]]
:[[Children's Online Privacy Protection Act]]
:[[Federal Information Security Management Act of 2002]]
:[[Federal Information Security Management Act of 2002]]
Line 36: Line 30:
:[[Health Insurance Portability and Accountability Act]]
:[[Health Insurance Portability and Accountability Act]]
:[[Sarbanes–Oxley Act]]
:[[Sarbanes–Oxley Act]]
 
:''Laws elsewhere''
;''Laws elsewhere''
 
:[[Data Protection Directive]]
:[[Data Protection Directive]]
:[[General Data Protection Regulation]]
:[[General Data Protection Regulation]]
 
:''Standards and best practices''
;''Standards and best practices''
 
:[[AS 8015]]
:[[AS 8015]]
:[[COBIT]]
:[[COBIT]]
Line 51: Line 41:
:[[ISO/IEC 38500]]
:[[ISO/IEC 38500]]
:[[Payment Card Industry Data Security Standard]]
:[[Payment Card Industry Data Security Standard]]
;3. Security
;3. Security
:[[Security]]
:[[Security]]
:[[Computer security]]
:[[Computer security]]
Line 60: Line 48:
:[[Cloud computing security]]
:[[Cloud computing security]]
:[[Security as a service]]
:[[Security as a service]]
 
:''Encryption and other security methods''
;''Encryption and other security methods''
 
:[[Attribute-based encryption]]
:[[Attribute-based encryption]]
:[[Bring your own encryption]]
:[[Bring your own encryption]]
Line 70: Line 56:
:[[Secret sharing]]
:[[Secret sharing]]
:[[Audit trail]]
:[[Audit trail]]
 
:''Security testing and management''
;''Security testing and management''
 
:[[Vulnerability management]]
:[[Vulnerability management]]
:[[Information security management]]
:[[Information security management]]
Line 80: Line 64:
:[[Data recovery]]
:[[Data recovery]]
:[[Cloud Security Alliance]]
:[[Cloud Security Alliance]]
;4. Risk Management
;4. Risk Management
:[[IT risk management]]
:[[IT risk management]]

Revision as of 14:36, 7 December 2018

Cloud Computing Security Handbook
Regulatory Compliance and Best Practices
Cloud computing.svg
This is a LIMSwiki book, a collection of LIMSwiki articles that can be easily saved, rendered electronically, and ordered as a printed book.

Edit this book: Book Creator · Wikitext
Select format to download:

PDF (A4) · PDF (Letter)

Order a printed copy from these publishers: PediaPress
Start ] [ FAQ ] [ Basic help ] [ Advanced help ] [ Feedback ] [ Recent Changes ]


Cloud Computing Security Handbook: Regulatory Compliance and Best Practices

The goal of this guide is to provide an overview of regulatory compliance and best practices in the field of cloud computing. This book is made available under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license.

1. Introduction to Cloud Computing
Cloud computing
IEEE Cloud Computing
Service-level agreement
2. Regulatory Compliance and Standards
Legal aspects of computing
United States law
Children's Online Privacy Protection Act
Federal Information Security Management Act of 2002
FedRAMP
Gramm–Leach–Bliley Act
Health Information Technology for Economic and Clinical Health Act
Health Insurance Portability and Accountability Act
Sarbanes–Oxley Act
Laws elsewhere
Data Protection Directive
General Data Protection Regulation
Standards and best practices
AS 8015
COBIT
Corporate governance of information technology
Corporate Governance of ICT
ISO/IEC 27000
ISO/IEC 38500
Payment Card Industry Data Security Standard
3. Security
Security
Computer security
Network security
Information security
Cloud computing security
Security as a service
Encryption and other security methods
Attribute-based encryption
Bring your own encryption
Digital transaction management
Homomorphic encryption
Key distribution
Secret sharing
Audit trail
Security testing and management
Vulnerability management
Information security management
Information technology security audit
IT Baseline Protection Catalogs
Business continuity planning
Data recovery
Cloud Security Alliance
4. Risk Management
IT risk management
Risk IT
Incident management
Penetration test
Defensive computing