Information Security Governance Papers

Paper Title Suitable framework that helps them address risks and ensures their requirements are met
The Abstract of The Paper suitable framework that helps them address risks and ensures their requirements are met. Although Although the purpose of each of the seven framework the information security management and governance processes will not change when applied to a CCE, model we describe in the next section can be adapted many of the process considerations and required to any of the cloud computing deployment models, we actions will need to be modified to effectively plan, focus our discussion primarily on information security manage, and govern information security in a CCE. governance within the community cloud environment In all cases, it will be necessary to clarify specific because we believe the community CCE is the most roles, responsibilities, and accountability for each likely near-term adoption and migration strategy for major process step. Some steps may be points for federal government agencies. Exhibit 4 | Hybrid Cloud Illustration Organization’s Private Network “Spill Over” Internet Capacity as Needed Core Network Private Cloud Public or Community Cloud Source: Booz Allen Hamilton 5ISO/IEC 27001 Information Technology – Security Techniques – Information Security Management Systems – Requirements. 6NIST SP 800-39 Managing Risk from Information Systems. 4
Web Link http://www.slideshare.net/BoozAllen/information-security-governance-government-considerations-for-the-cloud-computing-environment

Back To Information Security Governance Papers List

Database Sections