• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Checklist Secure Cloud Computing : Part 2

By Abhishek Ghosh September 13, 2013 5:38 am Updated on September 13, 2013

Checklist Secure Cloud Computing : Part 2

Advertisement

Checklist for secure Cloud Computing is the continuation of previous article which addresses preliminary issues for many available Cloud solutions. Obviously, you will want to read the first article on Checklist for secure Cloud Computing from here. We will discuss three among the remaining points – Privacy, Technical and organizational measures, Transparency and Notification. Rest three fully oriented to data and will be again discussed as the final article of this series – checklist for secure cloud computing.

 

Checklist Secure Cloud Computing : Privacy and Reliability

 

In reference to secure cloud computing, experts has formulated the basic principles that have prevailed throughout some parts of the World now. These Nations, in accordance with the Federal Data Protection Act, hire only suppliers those provides a mutually reliable data protection. That is, the data owner knows the person responsible for the Privacy Processors or the processor has his personal obligation to maintain data confidentiality.

Processor performs regular mandatory training courses through valid certificates such as ISO 27001, attest to the reliability of the solution. These certificates should indicate that the operation of the solution is safe and there are no risks for operational usage by the customer. The processor should know the regulatory authority and should make a statement for regulatory privacy requirements exclusively from the reliable vendors to create the conditions for a secure cloud. The processor should only use reliable software solutions to create the conditions for a secure cloud.

Advertisement

---

 

Checklist Secure Cloud Computing : Technical and Organizational Measures

 
Checklist Secure Cloud Computing

Of course, the data owner or client should be interested in the technical and organizational measures (TOM) or the same for the suppliers. These include preventing unauthorized access to data processing equipments, with which personal data are processed or used to deny (access control), to prevent data processing systems by unauthorized persons access control can be used, to ensure that the users data-processing system can access only the authorized data, not personal data during the processing, access control must be used; to ensure that the personal data during electronic transmission on the storage on disk can not be read, copied, modified or removed and can be checked may be during transportation or it can be found out that which bodies transfer personal data by which data communication equipment, so that the later can be checked and determined whether it was accessed at all and by whom it was changed or removed (input control). Ensure that personal data are processed only in accordance with the instructions of the customer (job control). Ensure that the personal data are protected against accidental destruction or loss. Ensure that the data collected for different purposes can be separately processed.

 

Checklist Secure Cloud Computing : Transparency and Notification

 

The outsourcing of services is automatically connected to the insourcing of risk. For example, a data loss, the professional cloud provider must ensure that the data owner will be informed immediately. Also, the reporting of critical events is one of the duties and obligation of the Processor.

So, this ends the second part of Checklist Secure Cloud Computing and here is the last and final part.

This Article Has Been Shared 960 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Checklist Secure Cloud Computing : Part 2

  • Cloud Computing and Tools as a Service,Testing as a Service (TaaS)

    Cloud Computing and Virtualization has a definite relationship. What is this Tools as a Service or TaaS ? How TaaS works? Who uses and needs this TaaS?

  • Private Cloud Computing : How Private Cloud Works

    Private cloud Computing technology gives the full control and high scalability in a private, dedicated environment mainly as an Enterprise solution.

  • Cloud Computing IaaS : Functions and Examples

    Cloud Computing IaaS falls among the three classic divisions of models – IaaS, PaaS and SaaS. Many talks about cloud, but few actually know what they are talking about.

  • Sun and Cloud : The Story of Sun Cloud Computing

    Sun Cloud was an on-demand Cloud computing service at one dollar per hour charge. The diversity and complexity of cloud in the past three years since that time.

  • Contrast of Public Cloud and Private Cloud

    Contrast of Public Cloud and Private Cloud lies in various aspects. Naming system made a simple division as private and public cloud, but things are not easy.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cyberpunk Aesthetics: What’s in it Special January 27, 2023
  • How to Do Electrical Layout Plan for Adding Smart Switches January 26, 2023
  • What is a Data Mesh? January 25, 2023
  • What is Vehicular Ad-Hoc Network? January 24, 2023
  • Difference Between Panel Light, COB Light, Track Light January 21, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Checklist Secure Cloud Computing : Part 2," in The Customize Windows, September 13, 2013, January 30, 2023, https://thecustomizewindows.com/2013/09/checklist-secure-cloud-computing-part-2/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT