Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Dedication 1 Dedication 2 About the Author About the Technical Editor Foreword by William Corrington Foreword by Jim Reavis Chapter 1. Introduction to the Federal Cloud Computing Strategy
Introduction A Historical View of Federal IT Cloud Computing: Drivers in Federal IT Transformation Decision Framework for Cloud Migration Summary References
Chapter 2. Cloud Computing Standards
Introduction Standards Development Primer Cloud Computing Standardization Drivers Identifying Standards for Federal Cloud Computing Adoption Summary References
Chapter 3. A Case for Open Source
Introduction Open Source and the Federal Government OSS Adoption Challenges: Acquisition and Security OSS and Federal Cloud Computing Summary References
Chapter 4. Security and Privacy in Public Cloud Computing
Introduction Security and Privacy in the Context of the Public Cloud Federal Privacy Laws and Policies Safeguarding Privacy Information Security and Privacy Issues Summary References
Chapter 5. Applying the NIST Risk Management Framework
Introduction to FISMA Risk Management Framework Overview NIST RMF Process Summary References
Chapter 6. Risk Management
Introduction to Risk Management Federal Information Security Risk Management Practices Overview of Enterprise-Wide Risk Management NIST Risk Management Process Comparing the NIST and ISO/IEC Risk Management Processes Summary References
Chapter 7. Comparison of Federal and International Security Certification Standards
Introduction Overview of Certification and Accreditation NIST and ISO/IEC Information Security Standards Summary References
Chapter 8. FedRAMP Primer
Introduction to FedRAMP FedRAMP Policy Memo FedRAMP Concept of Operations Third Party Assessment Organization Program Summary References
Chapter 9. The FedRAMP Cloud Computing Security Requirements
Security Control Selection Process FedRAMP Cloud Computing Security Requirements Summary References
Chapter 10. Security Assessment and Authorization: Governance, Preparation, and Execution
Introduction to the Security Assessment Process Governance in the Security Assessment Preparing for the Security Assessment Executing the Security Assessment Plan Summary References
Chapter 11. Strategies for Continuous Monitoring
Introduction to Continuous Monitoring The Continuous Monitoring Process Continuous Monitoring within FedRAMP Summary References
Chapter 12. Cost-Effective Compliance Using Security Automation
Introduction CM Reference Architectures Security Automation Standards and Specifications Operational Visibility and Continuous Monitoring Summary References
Chapter 13. A Case Study for Cloud Service Providers
Case Study Scenario: “Healthcare Exchange” Applying the Risk Management Framework within FedRAMP References
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion