Verified Document

Cloud Computing And Security Web Content

Related Topics:

Department of Defense (Dod) And Cloud Computing Through cloud computing services and technology, the Dod is able to set up an enterprise cloud that is in line with department-wide federal-level IT efficiency programs and plans. Cloud computing facilitates consolidation of infrastructure, leveraging of commodity information technology services, and elimination of operational redundancies, whilst simultaneously boosting operational continuity. These programs' success, on the whole, is reliant on well-implemented security requirements that are delineated and comprehended by Dod Components as well as industry. Consistent application and functioning of the abovementioned requirements guarantees mission execution, offers protection to sensitive information, enhances success of the mission, and eventually leads to the operational efficiencies and results sought by the Dod (DISA, 2016 ).

A memo by the defense department's Chief Information Officer, dated December 15, 2014, with regard to up-to-date guidance in the area of acquiring and using commercial services in cloud computing defines the responsibilities of the Dod Component when availing themselves of enterprise cloud services. This memo enables responsible minimal acquisition of cloud services by components, according to security requirements delineated in the Fedramp (Federal Risk and Authorization Management Program) and the CC SRG (Cloud...

Earlier, the DISA (Defense Information Systems Agency) presented concepts to operate in the business cloud in its Cloud Security Model (CSM), whose first version described the general framework and offered early guidance on the area of public data. A subsequent version (v. 2.1) also incorporated the subject of Controlled Unclassified Information. CC SRG covers cloud security conditions in a similar format to the remaining DISA-issued SRGs. This particular SRG covers, displaces, and repeals the CSM that was issued earlier (DISA, 2016 ).
Based on using the NIST definitions, is it a private, public, hybrid cloud?

DoD's cloud is private, with services offered for the department exclusively. It supports a number of department- sponsored or department tenants within a single cloud. The Dod has the final authority over cloud service usage, and all non-Dod service utilization has to be Dod -sanctioned and -sponsored. Resources that offer cloud services have to be reserved for the department's use. They should be physically separated from those that are not reserved for the Dod. The defense department's business service programs that are classified as Saas cloud services (e.g., DCO (Defense Connect Online), DEE (Defense Enterprise Email), DEPS (Dod Enterprise Portal Service)), have to comply with Dodi 8510.01 prerequisites as well. These programs do…

Sources used in this document:
Bibliography

DISA. (2016 ). Department of Defense Cloud Computing Security Requirements Guide. Defense Information Systems Agency.

Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. Gaithersburg: NIST Special Publication 800-145.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security in Cloud Computing
Words: 3274 Length: 10 Document Type: Research Paper

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

Cloud Computing Is a Term
Words: 2980 Length: 11 Document Type: Term Paper

The user, of course, sees a virtual service (appearing like the data is stored in certain icon), the actual storage could be anywhere, and could vary from day-to-day. This is an advantage to the overall efficiency of the system because storage resources can then be allocated rather than static (Smith, Computing Beyond the Firewall, 2010). Cloud services are any web-based application -- from calendars and contact applications to word processing,

Cloud Computing Research Question and Experimental Design
Words: 1907 Length: 7 Document Type: Term Paper

Cloud Computing Research Question and Experimental Design Develop a research question that addresses one of the unknowns you identified in Part I of the literature review and sketch a quantitative or qualitative study that can answer the question about what is unknown and contribute to theory. Draw on the additional resources for this course for guidance in understanding the concepts (e.g., internal validity, threats to validity, and operationalization) needed to address

Cloud Computing and Business
Words: 1606 Length: 5 Document Type: Term Paper

Cloud Computing Security Pros & Cons Over the last ten years, cloud computing has rapidly grown and it is expected to grow even further as more businesses move online. When cloud computing was first conceived, many skeptics dismissed it as being just another tech fad that will quickly disappear. However, over the last three years cloud computing has truly changed the way we think about IT nowadays. The Cloud has significantly

Cloud Computing
Words: 3424 Length: 10 Document Type: Essay

Brodkin, J. (2008). Gartner: Seven cloud-Computing security risks. Infoworld, pp. 1 -- 3. Carlin, S. & Curran, K. (2011). Cloud computing security. International Journal Of Ambient Computing And Intelligence (IJACI), 3 (1), pp. 14 -- 19. Cloud Computing Benefits, risks and recommendations for information security. (2009). [e-book] Available through: ENISA https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security [Accessed: 24 Mar 2014]. Cloudsecurityalliance.org. (2011). Top threats to cloud computing: cloud security alliance. [online] Retrieved from: https://cloudsecurityalliance.org/research/top-threats [Accessed: 24 Mar 2014]. Feng,

Cloud Computing Will Be Discussed to Show
Words: 9986 Length: 26 Document Type: Research Proposal

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now