Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Executive Summary
1 Introduction
1.1 NIST Cloud Computing Program Background
1.2 NIST Cloud Computing Program Vision
1.3 Intended Audience and Use
1.4 Document Organization
2 NIST Cloud Computing Definition and Reference Architecture
2.1 Revisiting the Definition
2.2 NIST Cloud Computing Reference Architecture
2.2.1 Conceptual Model
2.2.2 Cloud Computing Actors
2.2.3 Architecture Components
2.3 NIST Cloud Computing Taxonomy
3 Cloud Computing Use Cases and Requirements
3.1 Target Business Use Case and High-Level Requirements
3.1.1 Business Use Case Template
3.1.2 Business Use Case Summaries
3.1.3 Business Use Case Analysis
3.2 SAJACC Use Cases and Technical Requirements
4 Cloud Computing Standards and Gap Analysis
4.1 Cloud Computing Standards
4.2 Cloud Computing Standards Gaps and USG Priorities
4.3 Accelerating the Development and the Use of Cloud Computing Standards
5 High-Priority Security Requirements
5.1 Understanding Security in the Cloud Context
5.1.1 Cloud Service Model Perspectives
5.1.2 Implications of Cloud Deployment Models
5.1.3 Shared Security Responsibilities
5.1.4 Developing Security Architecture for Cloud Systems
5.2 Challenging Security Requirements and Risk Mitigations
5.3 Process-Oriented Requirements
5.3.1 Application of NIST SP 800-53-style Controls and Compliance
5.3.2 Cloud Audit Assurance and Log Sensitivity Management
5.3.3 Cloud Certification and Accreditation Guidelines
5.3.4 Clear eDiscovery Guidelines
5.3.5 Cloud Privacy Guidelines
5.3.6 Clarified Security Control Roles and Responsibilities
5.3.7 Trustworthiness of Cloud Operators
5.3.8 Business Continuity and Disaster Recovery
5.4 Focused Technical Requirements
5.4.1 Technical Continuous Monitoring Capabilities
5.4.2 Visibility for Customers
5.4.3 Control for Customers
5.4.4 Data Protection Concerns
5.4.5 Risk of Account Compromise
5.4.6 Identity and Access Management (IAM) and Authorization
5.4.7 Multi-tenancy Risks and Concerns
5.4.8 Cloud-Based Denial of Service
5.4.9 Incident Response
6 Other Related Work
6.1 Cloud Data Issues
6.1.1 Operational Data Functions
6.1.2 Informational Data and Data Services
6.2 Service-Level Agreement Taxonomy
6.3 Reliability Research in Cloud-based Complex Systems
7 Summary and Next Steps
Appendix B. Useful References
0 of .
Results for:
No results containing your search query
P. 1


|Views: 164|Likes:
Published by Brian Nettles

More info:

Published by: Brian Nettles on Jan 13, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 36 are not shown in this preview.
You're Reading a Free Preview
Pages 41 to 85 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->