NIST logo

Publication Citation: Challenging Security Requirements for US Government Cloud Computing Adoption

NIST Authors in Bold

Author(s): Michaela Iorga;
Title: Challenging Security Requirements for US Government Cloud Computing Adoption
Published: November 27, 2012
Abstract: The Federal Cloud Strategy, February 8, 2010, outlines a federal cloud computing program that identifies program objectives aimed at accelerating the adoption of cloud computing across the federal government. NIST, along with other agencies, was tasked with a key role and specific activities in support of that effort, including the delivery of the NIST Cloud Computing Technology Roadmap and the publication of other Special Publications that address the reference architecture, definitions, and security aspects of cloud computing. In order to achieve adoption of cloud computing for the federal government, it is necessary to address the security and privacy concerns that federal agencies have when migrating their services to a cloud environment. To further exacerbate the situation, there are few documented details that directly address how to achieve some security aspects in a cloud environment. The purpose of this document is to provide an overview of the high-priority security and privacy challenges perceived by federal agencies as impediments to the adoption of cloud computing. The document provides descriptions of the existing mitigations to these security and privacy impediments. If no mitigations are listed, then ongoing efforts that could lead to mitigations are described. In the cases where no ongoing efforts were identified, the document makes recommendations for possible mitigation or references existing best practices.
Citation: NIST
Website: http://collaborate.nist.gov/twiki-cloud-computing/pub/CloudComputing/CloudSecurity/Challenging_Security_Requirements_for_US_Government_Cloud_Computing_Adoption_v6-WERB-Approved-Novt2012.pdf
Pages: 61 pp.
Keywords: cloud computing; security; cloud computing security; cloud computing security requirements
Research Areas: Cloud Computing, Computer Security, Cybersecurity
PDF version: PDF Document Click here to retrieve PDF version of paper (1MB)