Cloud Computing | Overview | Why Information Security Policies and Procedures are Important
57. What is cloud computing and why are information security policies so important, and do you offer comprehensive I.T. security documentation?
Cloud computing is an area within information security that contains an almost endless list of definitions and explanations, ranging from the very technical NIST definition of cloud computing, to the much more simplified, and easy-to-understand definition, such as the one provided by Wikipedia. So what is cloud computing? Taking the NIST definition and simplifying it, cloud computing is the following: “A model that allows for scalable, convenient, on-demand services to a shared pool of distributed computing resources, for which many models exist.” In essence, one’s computing resources live in the “cloud”, instead of a more traditional model, such as a client-server design, etc.
NIST Definition of Cloud Computing | 5 Core areas | 3 Models
The phrase has garnered much attention and widespread adoption since the mid 2000’s, but the concept isn’t as new as people would think. As for the various cloud models, vendors and others within the information technology arena are abuzz with new and catchy names and phrases, but referring back to NIST is generally a good idea. According to the NIST publication, “The NIST Definition of Cloud Computing” (published September, 2011), cloud computing itself consists of five (5) core characteristics, three (3) service models, and four (4) deployment models. Download the NIST whitepaper, titled “The NIST Definition of Cloud Computing”, to learn more.
Security Policies are an Important for Cloud Computing
What’s also important to note about cloud computing is its rapid expansion and widespread adoption of by companies. More and more organizations are either building out cloud computing platforms, offering such services to clients, while companies themselves are moving away from client-server, and traditional computing environments, ultimately to cloud computing. It’s a massive shift, one that will continue into the foreseeable future as cloud computing slowly, but surely, becomes the de facto computing environment for most organizations, regardless of sector, industry, or location.
But with this huge leap of information technology faith comes numerous requirements, the most important being that of security. After all, on-demand resources, while touted as efficient, scalable, and cost-effective – among other things – have large security concerns. Thus, one of the best ways to alleviate and mitigate these issues is putting in place comprehensive, well-written, high-quality information security policies and procedures, such as those offered by FLANK.
With the FLANK21 available that consists of literally hundreds of policies, procedures, forms, checklists, templates, provisioning and hardening documents – and more – the FLANK documentation is a must for cloud computing security.
Download Information Security Policies for Cloud Computing
Cloud security is a one-way freight train that can’t be stopped, so it’s time to put in place industry leading information security policies, such as the FLANK21 offered by FLANK