Security and Control in the Cloud

被引:41
作者
Julisch, Klaus [1 ]
Hall, Michael [2 ]
机构
[1] IBM Res GmbH, Saumerstr 4, CH-8803 Ruschlikon, Switzerland
[2] Forbes Sinclair, Madrid, Spain
来源
INFORMATION SECURITY JOURNAL | 2010年 / 19卷 / 06期
关键词
cloud computing; Security; ISMS; IS027001;
D O I
10.1080/19393555.2010.514654
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a new IT delivery paradigm that offers computing resources as on-demand services over the Internet. Like all forms of outsourcing, cloud computing raises serious concerns about the security of the data assets that are outsourced to providers of cloud services. To address these security concerns, we show how today's generation of information security management systems (ISMSs), as specified in the ISO/IEC 27001: 2005, must be extended to address the transfer of security controls into cloud environments. The resulting virtual ISMS is a standards-compliant management approach for developing a sound control environment while supporting the various modalities of cloud computing. This article addresses chief security and/or information officers of cloud client and cloud provider organizations. Cloud clients will benefit from our exposition of how to manage risk when corporate assets are outsourced to cloud providers. Providers of cloud services will learn what processes and controls they can offer in order to provide superior security that differentiates their offerings in the market.
引用
收藏
页码:299 / 309
页数:11
相关论文
共 32 条
[1]  
AICPA, 1992, 70 SAS AICPA
[2]  
Amazon, 2009, AM WEB SERV OV SEC P
[3]  
Amazon, 2010, SAS70 AWS
[4]  
Amazon, 2008, AM EC2 SERV LEV AGR
[5]  
[Anonymous], 2008, BIG SWITCH REWIRING
[6]  
[Anonymous], 2005, 27002 ISOIEC
[7]  
[Anonymous], 2005, ISOIEC27001
[8]  
Archer J., 2010, TOP THREATS CLOUD CO
[9]  
Bayuk J. L., 2004, STEPPING IS AUDIT WH
[10]  
Brunette G, 2009, SECURITY GUIDANCE CR