Difference between revisions of "Book:Cloud Computing Security Handbook: Regulatory Compliance and Best Practices"

From LIMSWiki
Jump to navigationJump to search
Line 48: Line 48:
:[[Corporate governance of information technology]]
:[[Corporate governance of information technology]]
:[[Corporate Governance of ICT]]
:[[Corporate Governance of ICT]]
:[[ISO/IEC 27000]]
:[[ISO/IEC 38500]]
:[[ISO/IEC 38500]]
:[[Payment Card Industry Data Security Standard]]
:[[Payment Card Industry Data Security Standard]]

Revision as of 21:52, 21 June 2016

Cloud Computing Security Handbook
Regulatory Compliance and Best Practices
Cloud computing.svg
This is a LIMSwiki book, a collection of LIMSwiki articles that can be easily saved, rendered electronically, and ordered as a printed book.

Edit this book: Book Creator · Wikitext
Select format to download:

PDF (A4) · PDF (Letter)

Order a printed copy from these publishers: PediaPress
Start ] [ FAQ ] [ Basic help ] [ Advanced help ] [ Feedback ] [ Recent Changes ]


Cloud Computing Security Handbook: Regulatory Compliance and Best Practices

The goal of this handbook is to provide an overview of regulatory compliance and best practices in the field of cloud computing. This book is made available under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license.

1. Introduction to Cloud Computing
Cloud computing
IEEE Cloud Computing
Service-level agreement
2. Regulatory Compliance and Standards
Legal aspects of computing
United States law
Children's Online Privacy Protection Act
Federal Information Security Management Act of 2002
FedRAMP
Gramm–Leach–Bliley Act
Health Information Technology for Economic and Clinical Health Act
Health Insurance Portability and Accountability Act
Sarbanes–Oxley Act
Laws elsewhere
Data Protection Directive
General Data Protection Regulation
Standards and best practices
AS 8015
COBIT
Corporate governance of information technology
Corporate Governance of ICT
ISO/IEC 27000
ISO/IEC 38500
Payment Card Industry Data Security Standard
3. Security
Security
Computer security
Network security
Information security
Cloud computing security
Security as a service
Encryption and other security methods
Attribute-based encryption
Bring your own encryption
Digital transaction management
Homomorphic encryption
Key distribution
Secret sharing
Audit trail
Security testing and management
Vulnerability management
Information security management
Information technology security audit
IT Baseline Protection Catalogs
Business continuity planning
Data recovery
Cloud Security Alliance
4. Risk Management
IT risk management
Risk IT
Incident management
Penetration test
Defensive computing