Book:Cloud Computing Security Handbook: Regulatory Compliance and Best Practices

From LIMSWiki
Jump to navigationJump to search
Cloud Computing Security Handbook
Regulatory Compliance and Best Practices
Cloud computing.svg
This is a LIMSwiki book, a collection of LIMSwiki articles that can be easily saved, rendered electronically, and ordered as a printed book.

Edit this book: Book Creator · Wikitext
Select format to download:

PDF (A4) · PDF (Letter)

Order a printed copy from these publishers: PediaPress
Start ] [ FAQ ] [ Basic help ] [ Advanced help ] [ Feedback ] [ Recent Changes ]


Cloud Computing Security Handbook: Regulatory Compliance and Best Practices

The goal of this handbook is to provide an overview of regulatory compliance and best practices in the field of cloud computing. This book is made available under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license.

1. Introduction to Cloud Computing
Cloud computing
IEEE Cloud Computing
Service-level agreement
2. Regulatory Compliance and Standards
Legal aspects of computing
United States law
Children's Online Privacy Protection Act
Federal Information Security Management Act of 2002
FedRAMP
Gramm–Leach–Bliley Act
Health Information Technology for Economic and Clinical Health Act
Health Insurance Portability and Accountability Act
Sarbanes–Oxley Act
Laws elsewhere
Data Protection Directive
General Data Protection Regulation
Standards and best practices
AS 8015
COBIT
Corporate Governance of ICT
Corporate governance of information technology
ISO/IEC 38500
Payment Card Industry Data Security Standard
3. Security
Security
Computer security
Network security
Information security
Cloud computing security
Security as a service
Encryption and other security methods
Attribute-based encryption
Bring your own encryption
Digital transaction management
Homomorphic encryption
Key distribution
Secret sharing
Audit trail
Security testing and management
Vulnerability management
Information security management
Information technology security audit
IT Baseline Protection Catalogs
Business continuity planning
Data recovery
Cloud Security Alliance
4. Risk Management
IT risk management
Risk IT
Incident management
Penetration test
Defensive computing