Book:Cloud Computing Security Handbook: Regulatory Compliance and Best Practices

From LIMSWiki
Revision as of 20:49, 9 June 2016 by Shawndouglas (talk | contribs) (Created as needed.)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search
Cloud Computing Security Handbook
Regulatory Compliance and Best Practices
Cloud computing.svg
This is a LIMSwiki book, a collection of LIMSwiki articles that can be easily saved, rendered electronically, and ordered as a printed book.

Edit this book: Book Creator · Wikitext
Select format to download:

PDF (A4) · PDF (Letter)

Order a printed copy from these publishers: PediaPress
Start ] [ FAQ ] [ Basic help ] [ Advanced help ] [ Feedback ] [ Recent Changes ]


Cloud Computing Security Handbook: Regulatory Compliance and Best Practices

The goal of this handbook is to provide an overview of regulatory compliance and best practices in the field of cloud computing. This book is made available under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license.

1. Introduction to Cloud Computing
Cloud computing
IEEE Cloud Computing
Service-level agreement
2. Regulatory Compliance and Standards
Sarbanes–Oxley Act
Health Insurance Portability and Accountability Act
Payment Card Industry Data Security Standard
ISO/IEC 38500
AS 8015
COBIT
Federal Information Security Management Act of 2002
Corporate Governance of ICT
Corporate governance of information technology
Capability Maturity Model
3. Security
Security
Information technology security audit
Information security
Cloud computing security
IT Baseline Protection Catalogs
Security as a service
Computer security
Network security
Information security management
Cloud Security Alliance
Business continuity planning
Data recovery
Audit trail
Data Protection Directive
Vulnerability (computing)
4. Risk Management
Risk IT
Incident management
Penetration test
IT risk management
Defensive computing