What should go to the Cloud and When. What should NOT go to the Cloud and Why
|
|
|
- Tyler Potter
- 10 years ago
- Views:
Transcription
1 What should go to the Cloud and When What should NOT go to the Cloud and Why
2 Cloud a New Business Model for IT delivery in Federal Programmatic approach to Cloud Security (FedRAMP, DISA SRG) Cloud Service Providers have built and had their infrastructure audited (via a 3PAO) to the required baselines Now possible to deliver some IT workloads from the Cloud The Question is Which IT workloads? The answer is different for each agency (or company) Civilian agencies follow the FedRAMP baseline (moderate systems = 325 baseline security controls from NIST SP v4) DoD agencies based on DoD Impact Levels
3 DoD Impact Levels Originally 6 levels, there are now 4 (level 1 was moved into 2, and level 3 was moved into 4) Impact Level-2 = uncontrolled Unclass information (public facing information) Impact Level-4 = Controlled Unclass information PII, PHI, mission sensitive Impact Level-5 = Unclass National Security Systems Impact Level-6 = information upto Secret level DoD Cloud Service Provider requirements begin with FedRAMP Impact Level-2 requires FedRAMP Impact Levels 4, 5, 6 require FedRAMP + All FedRAMP controls PLUS additional security controls for the specific Impact Level plus any additional controls required of the mission
4 Responsibilities of Agencies/Missions Use Cloud Services for IT Delivery when: It is mission-effective and It is cost-effective Only use approved FedRAMP or DISA Cloud Service Providers Those with FedRAMP/DISA P-ATO (Provisional Authority To Operate) In DoD cloud service must be approved to appropriate Impact Level Perform a security controls gap analysis to determine if a given application/service requires additional security controls beyond those accounted for in the FedRAMP and FedRAMP + baselines. Grant an ATO to the Cloud Service Provider if appropriate
5 Typical Data Center, all IT services delivered on premise from the data center, important to know the TCO for this model Existing Apps/infrastructure New IT initiative Typical Data Centers Retired infrastructure now Test/Dev
6 Challenges with TCO calculations in agencies Primary measures: Cloud should be used when it s the most missioneffective and cost-effective means of IT delivery Determining the most cost-effective business model means knowing what it costs you (the agency), to deliver an IT service Can be difficult for agencies to determine their TCO because TCO calculations can span multiple budgets in Federal In Federal the infrastructure, network and facilities can all be different budget owners A net spending increase in one area could bring big savings in another so TCO is really important
7 Cloud brings New Possibilities for IT delivery AWS Azure VMware Existing Apps/infrastructure New IT initiative Retired Infrastructure Test/Dev
8 Cloud is a new Business Model Of your current IT, what could be more cost effective and/or efficient if delivered from a Cloud provider? Which is the best Cloud provider for a given IT app/service? AWS Azure VMware
9 How we determine what should or should not be delivered from a Cloud provider Some things to review: Characteristics of the application App cloud ready? Existing investment been realized? Licensing issues? (processor based) Data transfer Dependent systems First inspect each IT workload through a Business lens 3 Outputs List of workloads that should NOT go to the Cloud List of workloads that can not go to the Cloud now, but could be made to List of workloads that should be considered for delivery from a Cloud provider
10 Next review the Cloud ready list from the business review through a Security lens Review System Security Plans Compare against FedRAMP controls Determine if security control gaps can be accommodated by one or more CSPs Review first through a business lens and then through a security lens because the security review is tedious, specific and very important. It requires a very specific skill set. 3 Outputs List of IT Workloads that should NOT go to any Cloud provider List of IT workloads that can not currently go to any Cloud provider but could be made to List of IT workloads that CAN go to a Cloud provider Mission Effective
11 Review the Cloud candidate list to determine which Cloud service provider would be best for a given IT service. Determine if it is cost-effective to deliver that IT service from a Cloud Provider AWS Azure VMware Although each Cloud Provider builds their infrastructure to the same FedRAMP/DISA security controls, how they deliver services and how they charge for services can differ greatly
12 Final Points: Utilize Cloud when mission-effective and cost-effective Cloud is not the best delivery model for everything The cost of Cloud and the savings from Cloud can span multiple budgets so TCO is important A cost in one budget activity can lead to tremendous savings in a different budget activity Business considerations and security considerations, rule an IT app/service in or out as a cloud candidate first from business standpoint, then from a security standpoint Determine the best approved Cloud Provider for your particular needs/workloads What is best for one agency, could be very wrong for another
13 Thank You!
DISA releases updated DoD Cloud Requirements What are the impacts? James Leach January 2015
DISA releases updated DoD Cloud Requirements What are the impacts? James Leach January 2015 New leadership breeds new policies and different approaches to a more rapid adoption of cloud services for the
DoD Cloud Computing Security Requirements Guide (SRG) Overview
DoD Cloud Computing Security Requirements Guide (SRG) Overview 1 General SRG Information Released 12 January 2015 Version 1, release 1 Provides comprehensive security guidance for components (missions)
Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent
Cloud Security A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud Sean Curry Sales Executive, Aquilent The first in a series of audits DoD did not fully execute elements of the July 2012
December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments
December 8, 2011 MEMORANDUM FOR CHIEF INFORMATION OFFICERS FROM: SUBJECT: Steven VanRoekel Federal Chief Information Officer Security Authorization of Information Systems in Cloud Computing Environments
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
Federal Risk and Authorization Management Program (FedRAMP)
Federal Risk and Authorization Management Program (FedRAMP) NIST June 5, 2013 Matt Goodrich, JD FedRAMP, Program Manager Federal Cloud Computing Initiative OCSIT GSA What is FedRAMP? FedRAMP is a government-wide
AWS Worldwide Public Sector
15 Minute Introduction to AWS and Q&A April 2015 Mark Fox Sr. Manager DoD Sales I love/hate relationship with the term cloud Now the IT norm Commercial Cloud should not be scary nor considered less secure
DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1. 12 January 2015
DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1 12 January 2015 Developed by the Defense Information Systems Agency (DISA) for the Department of Defense
DoD ENTERPRISE CLOUD SERVICE BROKER CLOUD SECURITY MODEL
DoD ENTERPRISE CLOUD SERVICE BROKER CLOUD SECURITY MODEL Version 1.0 Developed by the Defense Information Systems Agency (DISA) for the Department of Defense (DoD) EXECUTIVE SUMMARY The 26 June 2012 DoD
10 Considerations for a Cloud Procurement. Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015
10 Considerations for a Cloud Procurement Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015 www.lbmctech.com [email protected] Purpose: Cloud computing provides public sector organizations
How To Write The Jab P-Ato Vulnerability Scan Requirements Guide
FedRAMP JAB P-ATO Vulnerability Scan Requirements Guide Version 1.0 May 27, 2015 JAB P-ATO Vulnerability Scan Requirements Guide Page 1 Revision History Date Version Page(s) Description Author May 27,
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
HyTrust Addendum to the VMware Product Applicability Guide. For. Federal Risk and Authorization Management Program (FedRAMP) version 1.
HyTrust Product Applicability Guide For Federal Risk and Authorization Management Program (FedRAMP) VMware Compliance Reference Architecture Framework to the VMware Product Applicability Guide For Federal
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
Best Practices Guide for DoD Cloud Mission Owners
Best Practices Guide for Department of Defense Cloud Mission Owners Version 1.0 Last updated 2015-08-06 Developed by the Defense Information Systems Agency (DISA) For the Department of Defense (DoD) IMPORTANT:
Security Authorization Process Guide
Security Authorization Process Guide Office of the Chief Information Security Officer (CISO) Version 11.1 March 16, 2015 TABLE OF CONTENTS Introduction... 1 1.1 Background... 1 1.2 Purpose... 2 1.3 Scope...
Esri Managed Cloud Services and FedRAMP
Federal GIS Conference February 9 10, 2015 Washington, DC Esri Managed Cloud Services and FedRAMP Erin Ross & Michael Young Agenda Esri Managed Services Program Overview Example Deployments New FedRAMP
FISMA Cloud GovDataHosting Service Portfolio
FISMA Cloud Advanced Government Oriented Cloud Hosting Solutions Cyber FISMA Security Cloud Information Security Management Compliance Security Compliant Disaster Recovery Hosting Application Cyber Security
Capabilities Overview
Premier Provider of egov Services to the Commonwealth of Virginia Capabilities Overview May 2015 Your One Stop Shop for egov Services CAI ITCL Statement of Work Contract Application Development VITA egov
FedRAMP Online Training Security Assessment Plan (SAP) Overview 12/9/2015 Presented by: FedRAMP PMO
FedRAMP Online Training Security Assessment Plan (SAP) Overview 12/9/2015 Presented by: FedRAMP PMO www.fedramp.gov www.fedramp.gov 1 Today s Training Welcome to Part Four of the FedRAMP Training Series:
The Benefits of FedRAMP. Shamun Mahmud, DLT Cloud Advisory Group
The Benefits of FedRAMP Shamun Mahmud, DLT Cloud Advisory Group The Benefits of FedRAMP Shamun Mahmud, DLT Cloud Advisory Group, DLT Solutions LCC 2012 Executive Summary FedRAMP (Federal Risk and Authorization
Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications
Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee
NGEN Re-compete Industry Day Navy Data Center Consolidation
NGEN Re-compete Industry Day Navy Data Center Consolidation Mr. John Pope Director, DCAO 17 November 2015 Multiple independent data centers grew up organically to support the warfighter. Lack of configuration
Department of Defense Use of Commercial Cloud Computing Capabilities and Services
I N S T I T U T E F O R D E F E N S E A N A L Y S E S Department of Defense Use of Commercial Cloud Computing Capabilities and Services Laura A. Odell, Project Leader Ryan R. Wagner Tristan J. Weir November
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,
VA Enterprise Design Patterns: 6. Cloud Computing 6.1 Enterprise Cloud Services Broker
VA Enterprise Design Patterns: 6. Cloud Computing 6.1 Enterprise Cloud Services Broker Office of Technology Strategies (TS) Architecture, Strategy, and Design (ASD) Office of Information and Technology
Dell Cloud Solutions. The simplest path to your cloud. Marian Kovacik. Solution Engineer
Dell Cloud Solutions The simplest path to your cloud Marian Kovacik Solution Engineer Cloud adoption today 56 out of 100 enterprises consider cloud to be a strategic differentiator today By 2018, the projected
NIST Cloud Computing Security Reference Architecture (SP 500-299 draft)
NIST Cloud Computing Security Reference Architecture (SP 500-299 draft) NIST Cloud Computing Security Working Group Dr. Michaela Iorga, NIST Senior Security Technical Lead for Cloud Computing Chair, NIST
Hybrid Cloud Identity and Access Management Challenges
Hybrid Cloud Identity and Access Management Challenges Intro: Timothy P. McAliley [email protected] Microsoft Premier Field Engineer, SQL Server, Washington, DC CISA, CISM, CISSP, ITIL V3,
Security Control Standard
Department of the Interior Security Control Standard Maintenance January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information Officer
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
INDUSTRY PERSPECTIVE
INDUSTRY PERSPECTIVE 1 A Brief Introduction As IT administrators and chief information officers, you face a particular challenge: facilitate the ability for your agency to work remotely, while reducing
Note: This App is under development and available for testing on request. Note: This App is under development and available for testing on request. Note: This App is under development and available for
How To Cloud Compute At The Cloud At The Cyclone Center For Cnc
Cloud Computing at CDC Current Status and Future Plans Earl Baum March, 2014 1 Background Current Activities Agenda Use Cases, Shared Services and Other Considerations What s Next 2 Background Cloud Definition
Using ArcGIS for Server in the Amazon Cloud
Federal GIS Conference February 9 10, 2015 Washington, DC Using ArcGIS for Server in the Amazon Cloud Bonnie Stayer, Esri Amy Ramsdell, Blue Raster Session Outline AWS Overview ArcGIS in AWS Cloud Builder
Solution White Paper Build the Right Cloud, Quickly
Solution White Paper Build the Right Cloud, Quickly BMC Express Cloud Table of Contents 1 THE PROMISE OF CLOUD COMPUTING Getting Started 2 SUCCEEDING WITH CLOUD COMPUTING 3 INTRODUCING BMC EXPRESS CLOUD
Securing Government Clouds Preparing for the Rainy Days
Securing Government Clouds Preparing for the Rainy Days Majed Saadi Director, Cloud Computing Practice Agenda 1. The Cloud: Opportunities and Challenges 2. Cloud s Potential for Providing Government Services
FedRAMP Government Discussion Matt Goodrich, FedRAMP Director
FedRAMP Government Discussion Matt Goodrich, FedRAMP Director January 14, 2015 [classification marking] PAGE FedRAMP Overview Ensuring Secure Cloud Computing FedRAMP was established via OMB Memo in December
DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process
Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY
Microsoft SharePoint Architectural Models
Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint
Status of Cloud Computing Environments within OPM (Report No. 4A-CI-00-14-028)
MEMORANDUM FOR KATHERINE ARCHULETA Director FROM: SUBJECT: PATRICK E. McFARLAND Inspector General Status of Cloud Computing Environments within OPM (Report No. 4A-CI-00-14-028) The purpose of this memorandum
Cloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
DoD Needs an Effective Process to Identify Cloud Computing Service Contracts
Inspector General U.S. Department of Defense Report No. DODIG-2016-038 DECEMBER 28, 2015 DoD Needs an Effective Process to Identify Cloud Computing Service Contracts INTEGRITY EFFICIENCY ACCOUNTABILITY
Monetizing the Business Edge with Hosted Private Cloud Services
A Foresight Valuation Group White Paper Monetizing the Business Edge with Hosted Private Cloud Services An Analysis of the Economic Impact for Network Service Providers (NSPs) ` Sponsored by Juniper Networks
Key differences between virtualization and cloud computing
E-Guide Key differences between virtualization and cloud computing If you have deployed virtualization in your organization, does that mean you have a private cloud? In this expert e-guide from SearchServerVirtualization.com,
Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION
SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic
HP Converged Cloud Cloud Platform Overview. Shane Pearson Vice President, Portfolio & Product Management
HP Converged Cloud Cloud Platform Overview Shane Pearson Vice President, Portfolio & Product Management Cloud is the biggest disruption since the Internet 1970-80s Mainframe 1990s Client/Server 2000s The
Federal Cloud Security
Federal Cloud Security The views, opinions and/or findings contained in this report are those of The MITRE Corporation and should not be construed as an official government position, policy, or decision,
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
IT-CNP, Inc. Capability Statement
Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government
How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing
How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing Warren S. Udy, CISSP Senior Cyber Security Advisor Office of Cyber Security 301-903-5515 [email protected]
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative September 2014 Council of the Inspectors General on Integrity and Efficiency Cloud Computing Initiative Executive
Incident Management. Verdis Spearman [email protected] 703.235.5443
Incident Management Verdis Spearman [email protected] 703.235.5443 Agenda Overview Governance Stakeholders Responsibilities Trusted Internet Connection Initiative Incident Response Requirements
How To Understand Cloud Computing
Capacity Management for Cloud Computing Chris Molloy Distinguished Engineer Member, IBM Academy of Technology October 2009 1 Is a cloud like touching an elephant? 2 Gartner defines cloud computing as a
System Center 2012 R2 Licensing Datasheet
Licensing Datasheet Product Overview Microsoft offers solutions for managing datacenter resources, private clouds, and client devices. Private Cloud/ Management helps your organization achieve IT as a
CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance
United States Government Accountability Office Report to Congressional Requesters April 2016 CLOUD COMPUTING Agencies Need to Incorporate Key Practices to Ensure Effective Performance GAO-16-325 April
Solicitation Addendum
Solicitation Number: 100049 Solicitation Description: Solicitation Opening Date and Time: Addendum Number: 01 Addendum Date: May 23, 2016 Purchasing Agent: NORTH CAROLINA DEPARTMENT OF INFORMATION TECHNOLOGY
Information Security. Rick Aldrich, JD, CISSP Booz Allen Hamilton [email protected]
Information Security Rick Aldrich, JD, CISSP Booz Allen Hamilton [email protected] Overview (Fed Info Sys) From NIST SP 800-60, Vol 1, Guide for Mapping Types of Information Systems to Security Categories
ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002
ForeScout CounterACT and Compliance An independent assessment on how network access control maps to leading compliance mandates and helps automate GRC operations June 2012 Overview Information security
locuz.com A comprehensive orchestration tool for setting up private and hybrid clouds
locuz.com A comprehensive orchestration tool for setting up private and hybrid clouds An innovative and flexible cloud platform for creating, deploying and managing highly reliable and scalable cloud infrastructure
GAO INFORMATION TECHNOLOGY REFORM. Progress Made but Future Cloud Computing Efforts Should be Better Planned
GAO July 2012 United States Government Accountability Office Report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee
HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps
WHITE PAPER HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps Summary Summary Compliance with PCI, HIPAA, FISMA, EU, and other regulations is as critical in virtualized
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)
Session 5. Mixing and matching Public, Private and Hybrid Clouds for maximum benefits
Session 5. Mixing and matching Public, Private and Hybrid Clouds for maximum benefits Best of both/ Best of all regarding specific needs, based on the use of resources Hybrid cloud is simply a mix of private
Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service
Cloud Computing Best Practices Cloud Computing Best Practices Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Overview Cloud Computing
Guide to Understanding FedRAMP. Guide to Understanding FedRAMP
Guide to Understanding FedRAMP Version 1.0 June 5, 2012 Executive Summary This document provides helpful hints and guidance to make it easier to understand FedRAMP s requirements. The primary purpose of
Hybrid Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Hybrid Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction The economic benefits offered by public clouds are attractive enough for many
The role of certification and standards for trusted Cloud solutions
The role of certification and standards for trusted Cloud solutions A CloudWATCH webinar 2014 Cloud Security Alliance - All Rights Reserved. Agenda 15:00 Welcome and Introduction 10 15:10 The role of
Hybrid Cloud Architecture: How to Streamline Hybrid Cloud Migration
Hybrid Cloud Architecture: How to Streamline Hybrid Cloud Migration Introduction According to a Nucleus Research report cloud applications deliver 1.7 times more return on investment on average over on-
Journey to Cloud 10 Questions
Journey to Cloud 10 Questions Introduction Implementing cloud solutions into your portfolio can provide opportunities to increase agility and improve process efficiency by supporting a faster time to deploy
DoD-Compliant Implementations in the AWS Cloud
DoD-Compliant Implementations in the AWS Cloud Reference Architectures Paul Bockelman Andrew McDermott April 2015 Contents Contents 2 Abstract 3 Introduction 3 Getting Started 4 Shared Responsibilities
Solving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
Securing the Microsoft Cloud
Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from
