Freshly Printed - allow 10 days lead
Federal Cloud Computing
The Definitive Guide for Cloud Service Providers
The only book to provide a roadmap for navigating federal cloud computing guidelines.
Matthew Metheny (Author)
9780128097106, Elsevier Science
Paperback, published 20 January 2017
536 pages
23.5 x 19 x 3.3 cm, 1.45 kg
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.
1. Introduction to the federal cloud computing strategy 2. Cloud computing standards 3. A case for open source 4. Security and privacy in public cloud computing 5. Applying the NIST risk management framework 6. Risk management 7. Comparison of federal and international security certification standards 8. FedRAMP primer 9. The FedRAMP cloud computing security requirements 10. Security testing: Vulnerability assessments and penetration testing 11. Security assessment and authorization: Governance, preparation, and execution 12. Strategies for continuous monitoring 13. Continuous monitoring through security automation 14. A case study for cloud service providers
Subject Areas: Computer security [UR], Databases & the Web [UNN], Internet: general works [UBW]