The Ten Commandments of Cloud Computing Security Management

被引:0
作者
Kouatli, Issam [1 ]
机构
[1] LAU, Sch Business, ITOM Dept, Beirut, Lebanon
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014) | 2014年
关键词
Cloud ethics; BYOD mobility; Data protection; Cloud security management; Cloud Governance;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Just like any new emergent of technology, Cloud computing comes with security issues. These issues even amplified recently with mobility access. Managing and maintain security of cloud computing environment is not only dependent on technological solution but also heavily dependent on ethical behavior of IT professionals working in the Cloud Computing environment as well as the good manageability of data protection procedures. This paper identifies ten different criteria with recommended instructions for effective management of cloud computing environment. The proposed "Commandments" stems from the interdependence of security, protection and Ethics where a survey conducted on these three pillars of cloud management and it shows that ethics and protection as well as ethics and security are highly correlated with 1% significance. Appropriate management of cloud computing environment is like a three legged stool where the three legs represents the three pillars of security, protection and ethics while the surface of the stool represents the IT governance and management of these three critical pillars of cloud computing environment. Management in such environment is interrelated between motivation of IT staff to behave ethically at all times as well as monitoring and control of Man and machines in a good manner to eliminate any possible threat. IT Governance on the other hand, aligns the IT strategy with business strategy, to ensure that cloud computing operations stay on track to achieve their strategies and goals, and implementing good ways to measure IT performance. The objective is to achieve a proactive approach to securely manage such technological environment. The "commandments" discussed in this paper would be very important for cloud service providers to gain trust of their clients (businesses) when requesting cloud services. Unlike technological solutions, these commandments are cloud management steps rather than the turbulent technological development steps for secure solution as these are changing as new technology, devices and protocols emerges.
引用
收藏
页码:73 / 81
页数:9
相关论文
共 13 条
[1]  
Bansal Nidhi, 2013, International Journal of Cloud Computing, V2, P48, DOI 10.1504/IJCC.2013.050955
[2]  
CISCO, 13601 CISCO
[3]  
Goscinski Andrzej, 2011, International Journal of Cloud Computing, V1, P37, DOI 10.1504/IJCC.2011.043245
[4]  
Jinhui Yao, 2012, International Journal of Cloud Computing, V1, P240
[5]  
Kouatli I, 2013, INT J TRADE IN PRESS
[6]  
Kouatli I., 2015, J MANAGEMEN IN PRESS, V21
[7]  
Kouatli I., 2011, SOC INT BUS RES SIBR
[8]  
Meland Per Hakon, 2014, International Journal of Cloud Computing, V3, P69, DOI 10.1504/IJCC.2014.058831
[9]  
Petri Ioan, 2012, International Journal of Cloud Computing, V1, P221, DOI 10.1504/IJCC.2012.046714
[10]  
Ramon C. B., 1992, PURSUIT 10 COMMANDME