ABSTRACT Cloud computing is a new IT delivery paradigm that offers computing resources as on-demand services over the Internet. Like all forms of outsourcing, cloud computing raises serious concerns about the security of the data assets that are outsourced to providers of cloud services. To address these security concerns, we show how today's generation of information security management systems (ISMSs), as specified in the ISO/IEC 27001:2005, must be extended to address the transfer of security controls into cloud environments. The resulting virtual ISMS is a standards-compliant management approach for developing a sound control environment while supporting the various modalities of cloud computing. This article addresses chief security and/or information officers of cloud client and cloud provider organizations. Cloud clients will benefit from our exposition of how to manage risk when corporate assets are outsourced to cloud providers. Providers of cloud services will learn what processes and controls they can offer in order to provide superior security that differentiates their offerings in the market.
[1]
Frank Gens,et al.
Cloud Computing Benefits, risks and recommendations for information security
,
2010
.
[2]
Arnoldo C. Hax,et al.
Competitive Cost Dynamics: The Experience Curve
,
1982
.
[3]
Leslie P. Willcocks,et al.
Intelligent It Outsourcing
,
2003
.
[4]
Tim Mather,et al.
Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance
,
2009,
Theory in practice.
[5]
Heiko Gewald,et al.
A Governance Model for Managing Outsourcing Partnerships
,
2006
.
[6]
Daniele Catteddu and Giles Hogben.
Cloud Computing. Benefits, risks and recommendations for information security
,
2009
.
[7]
Stuart Hannabuss,et al.
The Big Switch: Rewiring the World, from Edison to Google
,
2009
.
[8]
日本規格協会.
情報技術-セキュリティ技術-情報セキュリティマネジメントシステム-要求事項 : 国際規格ISO/IEC 27001 = Information technology-Security techniques-Information security management systems-Requirements : ISO/IEC 27001
,
2005
.
[9]
Kevin Curran,et al.
Cloud Computing Security
,
2011,
Int. J. Ambient Comput. Intell..