DocumentCode
267141
Title
Reflecting on Whether Checklists Can Tick the Box for Cloud Security
Author
Duncan, Bob ; Whittington, Mark
Author_Institution
Comput. Sci., Univ. of Aberdeen, Aberdeen, UK
fYear
2014
fDate
15-18 Dec. 2014
Firstpage
805
Lastpage
810
Abstract
All Cloud computing standards are dependent upon checklist methodology to implement and then audit the alignment of a company or an operation with the standards that have been set. An investigation of the use of checklists in other academic areas has shown there to be significant weaknesses in the checklist solution to both implementation and audit, these weaknesses will only be exacerbated by the fast-changing and developing nature of clouds. We examine the problems that are inherent with using checklists and seek to identify some mitigating strategies that might be adopted to improve their efficacy.
Keywords
cloud computing; security of data; standards; checklist methodology; cloud computing standards; cloud security; Cloud computing; Companies; Expert systems; Monitoring; Privacy; Security; Standards; assurance; audit; compliance; security; standards;
fLanguage
English
Publisher
ieee
Conference_Titel
Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on
Conference_Location
Singapore
Type
conf
DOI
10.1109/CloudCom.2014.165
Filename
7037765
Link To Document