Cloud Security

Cloud Security Links

The following links are provided as a courtesy. They should not be interpreted as an endorsement of the named organizations' products or services.


Wikipedia: Definition Cloud Computing Characteristics
Cloud Hosting Vs Traditional Hosting Explained
Traditional IT infrastructure vs the cloud, Part I and II
Cloud Security Best Practices
Clouds are more secure than traditional IT systems and here is why
How Secure is Cloud Computing?
Introduction to Cloud Security Architecture from a Cloud Consumer Perspective
Cloud Security Alliance (CSA) Definition
Microsoft says the pandemic has changed the future of cybersecurity in these five ways


Establish a data classification model for cloud encryption
Wikipedia: Definition Cloud Computing Characteristics
Data Integrity Check in Cloud Computing using Hash Functions
What is Cloud Security Monitoring?
4 Best Practices for Monitoring Cloud Infrastructure You Don't Own
Moving log management to a cloud computing provider


Data security concerns with online backup
Do I need to back up files that are already in cloud storage?
5 crucial multi-cloud disaster recovery principles
5 Benefits of Disaster Recovery in the Cloud
Auditor Insights - Business Continuity and Disaster Recovery Plans for the Cloud
The Essentials of Business Continuity Are Found in the Cloud


Understanding cloud compliance issues
Creating a governance framework for cloud security
Cloud Security Governance - Optimizing the Business Benefits of Security in the Cloud
Cloud Audit, Definition
Intrusion Detection Systems
Cloud Computing: What Auditors need to know, Deloitte.pdf
Microsoft: CMMC with Microsoft Azure, Ten Part Series
Intrusion detection in a cloud computing environment
How a Cloud Antivirus Works
Traditional Antivirus Software Versus Cloud-Based Solutions

Acquisition of Cloud Services

The Cloud Vs In-House Infrastructure, Deciding Which Is Best for Your Organization
The Pros and Cons of Cloud vs in House Servers
Traditional IT vs Cloud Computing, Gain the Competitive Advantage
Protect critical assets in the cloud by applying Operations Security
Maintaining security after a cloud computing implementation

Government Initiatives

CISA: Analysis Report AR21-013A: Strengthening Security Configurations to Defend Against Attackers Targeting Cloud Services
NSA: Mitigating Cloud Vulnerabilities
NSA: Cloud Security Basics
DISA: Secure Cloud Computing Architecture (SCCA)
What is the Secure Cloud Computing Architecture?
What is FedRAMP - How cloud providers get authorized to work with the U.S. government
What the NIST Framework Misses About Cloud Security
Thirst for new technologies, new capabilities driving IC's cloud expansion
ICITE shifts to reference architecture
DOD details its plans for JEDI cloud contract
Pentagon kicks off a winner-take-all among tech companies for multibillion-dollar cloud-computing contract
JEDI Industry Day leaves many wondering
DISA ramps up MilCloud 2.0 as it plans to shut down version 1 in 2019
Maintaining security after a cloud computing implementation
NSA Cybersecurity Advisory: Malicious Actors Abuse Authentication Mechanisms to Access Cloud Resources
NSA Cloud Security Basics