TECHOREVIEW

cloud security

Cloud Security Framework

Spread the love

In this blogpost, we will discuss the cloud security framework presented by the National Institute of Standards and Technology (NIST). Moreover,  the five components of the framework namely, identify, protect, detect, respond, and develop are also briefly highlighted.

With the increasing threats to the cloud security, the need to devise advanced methodologies to deal with these threats has increased. In this regard, the National Institute of Standards and Technology (NIST) has introduced the cloud security framework that offers the important key functions for management of security risks in the cloud environment. The cloud policy framework serves as the guidelines for the organizations to develop the security infrastructure. The five components of this framework include:

  • Identify—this refers to understanding the complete organizational requirements pertinent to the security and performing a comprehensive assessment of security risks.
  • Protect—suggests deploying the security procedures and measures so that the organizational infrastructure can be protected in the wake of attacks
  • Detect— the organization should have network monitoring procedures in place so that any issues or attempts to attack the organization can be proactively detected
  • Respond— in response to the potential or active threats to the organizational business appropriate countermeasures are needed to deal with the attacks
  • Develop—this refers to devising the procedures and measures to restore the operations in case of any disruption
As we know that the data and applications in the cloud environment are generally not secure because the owners do not have sufficient visibility and control over their data. Particularly, the public cloud where the resources of the cloud service providers are shared by multiple consumers or tenants, the security and privacy of the data is a big concern. Therefore, it is indeed a challenging task for the application architects to design and develop the systems that are secure and resilient.
To read about virtualization in cloud computing, click here.

Leave a Comment

Your email address will not be published. Required fields are marked *