• DocumentCode
    267141
  • Title

    Reflecting on Whether Checklists Can Tick the Box for Cloud Security

  • Author

    Duncan, Bob ; Whittington, Mark

  • Author_Institution
    Comput. Sci., Univ. of Aberdeen, Aberdeen, UK
  • fYear
    2014
  • fDate
    15-18 Dec. 2014
  • Firstpage
    805
  • Lastpage
    810
  • Abstract
    All Cloud computing standards are dependent upon checklist methodology to implement and then audit the alignment of a company or an operation with the standards that have been set. An investigation of the use of checklists in other academic areas has shown there to be significant weaknesses in the checklist solution to both implementation and audit, these weaknesses will only be exacerbated by the fast-changing and developing nature of clouds. We examine the problems that are inherent with using checklists and seek to identify some mitigating strategies that might be adopted to improve their efficacy.
  • Keywords
    cloud computing; security of data; standards; checklist methodology; cloud computing standards; cloud security; Cloud computing; Companies; Expert systems; Monitoring; Privacy; Security; Standards; assurance; audit; compliance; security; standards;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on
  • Conference_Location
    Singapore
  • Type

    conf

  • DOI
    10.1109/CloudCom.2014.165
  • Filename
    7037765