Difference between revisions of "Book:Cloud Computing Security Handbook: Regulatory Compliance and Best Practices"

From LIMSWiki
Jump to navigationJump to search
(Created as needed.)
 
(Updated with new finds and reorganization.)
Line 10: Line 10:


==''Cloud Computing Security Handbook: Regulatory Compliance and Best Practices''==
==''Cloud Computing Security Handbook: Regulatory Compliance and Best Practices''==
{{ombox
| type      = content
| style    = width: 500px;
| text      = This book should not be considered complete until this message box has been removed. This is a work in progress.
}}
The goal of this handbook is to provide an overview of regulatory compliance and best practices in the field of [[cloud computing]]. This book is made available under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International] license.
The goal of this handbook is to provide an overview of regulatory compliance and best practices in the field of [[cloud computing]]. This book is made available under the [http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International] license.


Line 20: Line 25:
;2. Regulatory Compliance and Standards
;2. Regulatory Compliance and Standards


:[[Legal aspects of computing]]
;''United States law''
:[[Children's Online Privacy Protection Act of 1998]]
:[[Federal Information Security Management Act of 2002]]
:[[FedRAMP]]
:[[Gramm–Leach–Bliley Act]]
:[[Health Information Technology for Economic and Clinical Health Act]]
:[[Health Insurance Portability and Accountability Act]]
:[[Sarbanes–Oxley Act]]
:[[Sarbanes–Oxley Act]]
:[[Health Insurance Portability and Accountability Act]]
 
:[[Payment Card Industry Data Security Standard]]
;''Laws elsewhere''
:[[ISO/IEC 38500]]
 
:[[Data Protection Directive]]
:[[General Data Protection Regulation]]
 
;''Standards and best practices''
 
:[[AS 8015]]
:[[AS 8015]]
:[[COBIT]]
:[[COBIT]]
:[[Federal Information Security Management Act of 2002]]
:[[Corporate Governance of ICT]]
:[[Corporate Governance of ICT]]
:[[Corporate governance of information technology]]
:[[Corporate governance of information technology]]
:[[Capability Maturity Model]]
:[[ISO/IEC 38500]]
:[[Payment Card Industry Data Security Standard]]


;3. Security
;3. Security


:[[Security]]
:[[Security]]
:[[Information technology security audit]]
:[[Computer security]]
:[[Network security]]
:[[Information security]]
:[[Information security]]
:[[Cloud computing security]]
:[[Cloud computing security]]
:[[IT Baseline Protection Catalogs]]
:[[Security as a service]]
:[[Security as a service]]
:[[Computer security]]
 
:[[Network security]]
;''Encryption and other security methods''
 
:[[Attribute-based encryption]]
:[[Bring your own encryption]]
:[[Digital transaction management]]
:[[Homomorphic encryption]]
:[[Key distribution]]
:[[Secret sharing]]
:[[Audit trail]]
 
;''Security testing and management''
 
:[[Vulnerability management]]
:[[Information security management]]
:[[Information security management]]
:[[Cloud Security Alliance]]
:[[Information technology security audit]]
:[[IT Baseline Protection Catalogs]]
:[[Business continuity planning]]
:[[Business continuity planning]]
:[[Data recovery]]
:[[Data recovery]]
:[[Audit trail]]
:[[Cloud Security Alliance]]
:[[Data Protection Directive]]
:[[Vulnerability (computing)]]


;4. Risk Management
;4. Risk Management
 
:[[IT risk management]]
:[[Risk IT]]
:[[Risk IT]]
:[[Incident management]]
:[[Incident management]]
:[[Penetration test]]
:[[Penetration test]]
:[[IT risk management]]
:[[Defensive computing]]
:[[Defensive computing]]



Revision as of 21:56, 9 June 2016

Cloud Computing Security Handbook
Regulatory Compliance and Best Practices
Cloud computing.svg
This is a LIMSwiki book, a collection of LIMSwiki articles that can be easily saved, rendered electronically, and ordered as a printed book.

Edit this book: Book Creator · Wikitext
Select format to download:

PDF (A4) · PDF (Letter)

Order a printed copy from these publishers: PediaPress
Start ] [ FAQ ] [ Basic help ] [ Advanced help ] [ Feedback ] [ Recent Changes ]


Cloud Computing Security Handbook: Regulatory Compliance and Best Practices

The goal of this handbook is to provide an overview of regulatory compliance and best practices in the field of cloud computing. This book is made available under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license.

1. Introduction to Cloud Computing
Cloud computing
IEEE Cloud Computing
Service-level agreement
2. Regulatory Compliance and Standards
Legal aspects of computing
United States law
Children's Online Privacy Protection Act of 1998
Federal Information Security Management Act of 2002
FedRAMP
Gramm–Leach–Bliley Act
Health Information Technology for Economic and Clinical Health Act
Health Insurance Portability and Accountability Act
Sarbanes–Oxley Act
Laws elsewhere
Data Protection Directive
General Data Protection Regulation
Standards and best practices
AS 8015
COBIT
Corporate Governance of ICT
Corporate governance of information technology
ISO/IEC 38500
Payment Card Industry Data Security Standard
3. Security
Security
Computer security
Network security
Information security
Cloud computing security
Security as a service
Encryption and other security methods
Attribute-based encryption
Bring your own encryption
Digital transaction management
Homomorphic encryption
Key distribution
Secret sharing
Audit trail
Security testing and management
Vulnerability management
Information security management
Information technology security audit
IT Baseline Protection Catalogs
Business continuity planning
Data recovery
Cloud Security Alliance
4. Risk Management
IT risk management
Risk IT
Incident management
Penetration test
Defensive computing