• Home
  • Archive
  • Tools
  • Contact Us
  • Forum

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
Home » Checklist for Secure Cloud Computing

By Abhishek Ghosh September 12, 2013 6:14 pm Updated on September 12, 2013

Checklist for Secure Cloud Computing

Advertisement

Checklist for secure Cloud Computing preliminary answers and support the decision makers in reviewing the many traded on the market solutions for collaboration. We need to think about what companies we want to use services of, the compliance policy with data protection and at the many more things.

 

Introduction to Checklist for secure Cloud Computing

 

The following Checklist for Secure Cloud Computing is preliminary answers and support decision makers in reviewing the many, trades on the market who delivers Cloud solutions for collaboration. Even in the age of Internet monitoring programs such as “PRISM” that can give a potential threat to the work environment for cross-sectoral collaboration on confidential information and documents which can be affected by the intelligence eavesdroppers. The checklist is based on recommendations of the by the Experts.

 

Checklist for secure Cloud Computing

 
Checklist for Secure Cloud Computing
Involved Instances

 

First the horses and riders must be named. This means you need to be determined in advance of working with a cloud provider for the privacy side for responsibility. It is about transparency. You have to know who is in the game. The data owner or the controller is called the company, which seeks a solution for secure collaboration in the cloud. Processor is referred as the solution provider of a web-based security platform for the safe and code-compliant exchange of confidential data and documents.

The subcontractors are mandated by the solution provider. This includes the servicer provider, a certified data center, which operates the solution and can give you information on where the data will be saved in our example. The data owner should be the complete list of subcontractors, including all subsidiaries. On cloud computing there are numerous parties involved. An example: In the context of two-factor authentication with password and SMS TAN for access to the platform, an SMS is sent to the mobile phone of the employees from a data center. To clarify the following questions : Who sent this text message in advance and get the mobile number? What about NSA?

Advertisement

---

 

Data Categories and Spatial Determinability

 

This is about the all-important question : What data is in the cloud and then where are these exactly? That may be irrelevant if a company provides only “boring” noncritical data such as company name, address, email and phone number. But as soon the migrated data is with reference to persons in the cloud, for example, information about the health status of an employee, the record or other personal characteristics, it is the noisy (Act) Federal Data Protection Act essentially to store this data in a specific, contractually specified region and the storage at any time to locate. Therefore, providers such as Amazon, Google and Microsoft fall through the cracks for secure cloud computing : You can not find out the location and name fast enough.

 

Inspection and Audit Rights

 

Before the law of the data sneaking methods became apparent, cloud had placed the safe working environment itself. Therefore, it stands to reason that the client secures as much as possible themselves before the contract gets as much insight into the requirements and benefits. We distinguish the full live audit in which the Lords looks at the live data and questions the processor and the subcontractor who provides the audit is written self-report, in which up to 20 questions are listed, the answer is the formulation of about 10-20 checkpoints that are typical and essential for a reliable cloud solution and the Audit via remote session, in which the data owner is switched on and gets the solution presented in the online meeting.

 

Continued to Part 2.

Facebook Twitter Google+ Pinterest

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Orthopaedic Surgeon, Author and Blogger. You can keep touch with him on Google Plus - Abhishek Ghosh1 and on Twitter - @AbhishekCTRL.

Follow the Author of this article :

13.7K+ Followers 18.7K+ Followers 2.5K+ Followers 1.5K Followers

Here’s what we’ve got for you which might like :

Articles Related to Checklist for Secure Cloud Computing

  • Fundamentals of Cloud Computing

    Fundamentals of Cloud Computing represents the History, Characteristics, Cloud Computing Models and Implementation of Cloud Computing in separate paragraphs.

  • Cloud Computing : Your Concerns and Thoughts of Richard Stallman

    Cloud Computing as terminology raises the eyebrows of some users who are associated with academics and computing for many years. Let us discuss on the topic.

  • Cloud Services for Your Everyday Life

    Cloud services for your everyday life starts from sharing content in Dropbox, Editing documents online to advanced features in online meetings.

  • Secure Connection to Cloud Infrastructure by VPN Tunnel

    Secure connection to Cloud Infrastructure by using VPN Tunnel – on Secure Cloud Computing Guide, we pointed the importance of the connecting device.

  • Top Cloud Computing Vendors

    Top Cloud Computing Vendors consists the name of the companies who has acceptable quality in the field of Cloud Computing as SaaS,IaaS or PaaS provider.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Google+ or Twitter to join the conversation right now!

If you want to Advertise on our Article or want Business Partnership, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

You can subscribe to our Free Once a Day, Regular Newsletter by clicking the subscribe button below.

Click To Subscribe Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website...

 

 

Popular Articles

All articles of this Website are fully Free to read. Here are some, which possibly you'll like to read! Do not hesitate to contact us for any concern.

Contact Us

Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Recent Posts

  • Approaches of Deep Learning : Part 1 April 22, 2018
  • Android Mobile Development Boards : Practical to Consider Now April 22, 2018
  • Mechanical Counter for Arduino : Basic Information April 21, 2018
  • Difference Between Microservices and API Based Cloud Services April 20, 2018
  • Example of Using IBM Watson For Text Analysis with Google Docs April 20, 2018

About This Article

Title: Checklist for Secure Cloud Computing
September 12, 2013
Author: Abhishek Ghosh
Subjects: Cloud Computing, Computer and Internet, Internet
Is Part Of:

TheCustomizeWindows, September 12, 2013, Vol.1(01),
p.1–39075 [IoT Ready Journal]

Source:The Customize Windows
ISSN: 0019-5847 ;
E-ISSN: 0019-5847 ;
Publisher: jima.in

Cite this article as: Abhishek Ghosh, "Checklist for Secure Cloud Computing," in The Customize Windows, September 12, 2013, April 22, 2018, https://thecustomizewindows.com/2013/09/checklist-for-secure-cloud-computing/.
This website uses cookies.

Read Cookie Policy

Contents are copyright protected and reproduction demands our permission.


PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

web analysis

Copyright © 2018 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy