- Cloud Computing Risk Assessment methodology – http://www.security-database.com/toolswatch/Cloud-Computing-Risk-Assessment.html
- ENISA Cloud Computing Risk Assessment – http://www.enisa.europa.eu/act/it/oar/cloud-computing/ | PDF – http://www.enisa.europa.eu/act/it/oar/cloud-computing/Cloud_Identity_Hogben.pdf
- Cloud Security Alliance (CSA) – http://www.cloudsecurityalliance.org/
- Governance, risk, and compliance stack – http://www.cloudsecurityalliance.org/grcstack.html
- CSA Cloud Controls Matrix – http://www.cloudsecurityalliance.org/cm.html
- Consensus Assessments Initiative – http://www.cloudsecurityalliance.org/cai.html
- CloudAudit’s A6 (The Automated Audit, Assertion, Assessment, and Assurance API) site – http://cloudaudit.org/
- The goal of CloudAudit is to provide a common interface and namespace that allows cloud computing providers to automate the Audit, Assertion, Assessment, and Assurance (A6) of their infrastructure (IaaS), platform (PaaS), and application (SaaS) environments and allow authorized consumers of their services to do likewise via an open, extensible and secure interface and methodology. CloudAudit is a volunteer cross-industry effort from the best minds and talent in Cloud, networking, security, audit, assurance and architecture backgrounds….
- Mitigating the risks of cloud computing (Mike Stephenson’s Blog; 2010.01.15) – http://stemi08.wordpress.com/2010/01/15/mitigating-the-risks-of-cloud-computing/
- Cloud Computing Risk Assessment (ENISA; 2009.11.20) – http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment [PDF]
- ITauditSecurity blog:
- Shipley on Cloud Computing Risks (2010.05.05) – http://itauditsecurity.wordpress.com/2010/05/05/shipley-cloud/
- Ready for Cloud Computing? (2010.02.12) – http://itauditsecurity.wordpress.com/2010/02/12/cloud1/
- Managing Intellectual Property & IT Security blog:
- “Lessons Learned from Cloud Camp Seattle 2010” by Dan Morrill (2010.02.04) – http://it.toolbox.com/blogs/managing-infosec/lessons-learned-from-cloud-camp-seattle-2010-36765
- “Can regulators keep up with Cloud Computing?” by Dan Morrill (2010.01.25) – http://it.toolbox.com/blogs/managing-infosec/can-regulators-keep-up-with-cloud-computing-36584
- K. Scott Morrison’s blog on Cloud technology – http://kscottmorrison.com/
- “You Can Help the Cloud Security Alliance Classify the Top Threats in the Cloud” (; 2010.02.22) – http://kscottmorrison.com/2010/02/22/you-can-help-the-cloud-security-alliance-classify-the-top-threats-in-the-cloud/
- Cloud Computing Best Practices – http://cloudbestpractices.wordpress.com/:
- Cloud Security Model – Framework for audit and compliance – http://cloudbestpractices.wordpress.com/2010/10/08/cloud-security-model-framework-for-audit-and-compliance/
- GigaOm:
- “Nov. 4: What We’re Reading About the Cloud” (2010.11.04) – http://gigaom.com/cloud/nov-4-what-were-reading-about-the-cloud/
- “Moving Regulated Industries to the Cloud” by Paul Miller (GigaOm; 2010.10.05) – http://gigaom.com/cloud/moving-regulated-industries-to-the-cloud-2/
- “Experts Get Serious About Cloud Security” by Derrick Harris (GigaOm; 2009.03.31) – http://gigaom.com/2009/03/31/experts-get-serious-about-cloud-security/
- “Ephemeral Borders: Privacy and Security of Data in the Cloud” (Aujas US blog; 2010.11.15) – http://aujasus.wordpress.com/2010/11/15/privacy-in-the-cloud/
- Cloud computing links at the A Passion for Research blog – http://softwarestrategiesblog.com/category/cloud-computing/
- Using rented computing to crack passwords (Utility, Cloud and Grid Computing blog; 2010.11.19) – http://utilitycomputing.wordpress.com/2010/11/19/using-rented-computing-to-crack-passwords/
- Paper: Forensic Examination of Volatile System Data Using Virtual Introspection (New World D0mber blog; 2010.11.11) – http://d0mber.wordpress.com/2010/11/11/paper-forensic-examination-of-volatile-system-data-using-virtual-introspection/
Related here: Cloud computing – https://eikonal.wordpress.com/2011/04/25/cloud-computing/ | Virtualization Tools – https://eikonal.wordpress.com/2010/12/02/virtualization-tools/ | Virtualization security – https://eikonal.wordpress.com/2010/08/09/virtualization-security/ | Threats of cloud computing – https://eikonal.wordpress.com/2010/02/03/threats-of-cloud-computing/.
[…] by Cloud security « Eikonal Blog — 2010.11.19 @ 16:19 […]
LikeLike
Pingback by Virtualization security « Eikonal Blog — 2010.11.19 @ 16:21
[…] VMware Discussion Forum – http://www.petri.co.il/forums/forumdisplay.php?f=43 Related here: Virtualization Security – https://eikonal.wordpress.com/2010/08/09/virtualization-security/ | Cloud security – https://eikonal.wordpress.com/2010/08/09/cloud-security/. […]
LikeLike
Pingback by Virtualization tools « Eikonal Blog — 2010.12.22 @ 14:01
[…] Cloud security – https://eikonal.wordpress.com/2010/08/09/cloud-security/ […]
LikeLike
Pingback by Threats of cloud computing « Eikonal Blog — 2011.02.23 @ 11:58
[…] Related here: Cloud security – https://eikonal.wordpress.com/2010/08/09/cloud-security/ | Virtualization Tools – https://eikonal.wordpress.com/2010/12/02/virtualization-tools/ | […]
LikeLike
Pingback by Cloud computing « Eikonal Blog — 2011.04.25 @ 11:09
[…] Cloud security – https://eikonal.wordpress.com/2010/08/09/cloud-security/ […]
LikeLike
Pingback by Information Security Sites « Eikonal Blog — 2011.05.17 @ 11:51
[…] Cloud security – https://eikonal.wordpress.com/2010/08/09/cloud-security/ […]
LikeLike
Pingback by Infosec online (= infosec sites) « Eikonal Blog — 2011.05.17 @ 12:49