Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
Dedication 1
Dedication 2
About the Author
About the Technical Editor
Foreword by William Corrington
Foreword by Jim Reavis
Chapter 1. Introduction to the Federal Cloud Computing Strategy
Introduction
A Historical View of Federal IT
Cloud Computing: Drivers in Federal IT Transformation
Decision Framework for Cloud Migration
Summary
References
Chapter 2. Cloud Computing Standards
Introduction
Standards Development Primer
Cloud Computing Standardization Drivers
Identifying Standards for Federal Cloud Computing Adoption
Summary
References
Chapter 3. A Case for Open Source
Introduction
Open Source and the Federal Government
OSS Adoption Challenges: Acquisition and Security
OSS and Federal Cloud Computing
Summary
References
Chapter 4. Security and Privacy in Public Cloud Computing
Introduction
Security and Privacy in the Context of the Public Cloud
Federal Privacy Laws and Policies
Safeguarding Privacy Information
Security and Privacy Issues
Summary
References
Chapter 5. Applying the NIST Risk Management Framework
Introduction to FISMA
Risk Management Framework Overview
NIST RMF Process
Summary
References
Chapter 6. Risk Management
Introduction to Risk Management
Federal Information Security Risk Management Practices
Overview of Enterprise-Wide Risk Management
NIST Risk Management Process
Comparing the NIST and ISO/IEC Risk Management Processes
Summary
References
Chapter 7. Comparison of Federal and International Security Certification Standards
Introduction
Overview of Certification and Accreditation
NIST and ISO/IEC Information Security Standards
Summary
References
Chapter 8. FedRAMP Primer
Introduction to FedRAMP
FedRAMP Policy Memo
FedRAMP Concept of Operations
Third Party Assessment Organization Program
Summary
References
Chapter 9. The FedRAMP Cloud Computing Security Requirements
Security Control Selection Process
FedRAMP Cloud Computing Security Requirements
Summary
References
Chapter 10. Security Assessment and Authorization: Governance, Preparation, and Execution
Introduction to the Security Assessment Process
Governance in the Security Assessment
Preparing for the Security Assessment
Executing the Security Assessment Plan
Summary
References
Chapter 11. Strategies for Continuous Monitoring
Introduction to Continuous Monitoring
The Continuous Monitoring Process
Continuous Monitoring within FedRAMP
Summary
References
Chapter 12. Cost-Effective Compliance Using Security Automation
Introduction
CM Reference Architectures
Security Automation Standards and Specifications
Operational Visibility and Continuous Monitoring
Summary
References
Chapter 13. A Case Study for Cloud Service Providers
Case Study Scenario: “Healthcare Exchange”
Applying the Risk Management Framework within FedRAMP
References
Index
← Prev
Back
Next →
← Prev
Back
Next →