Abstract
Cloud computing is quickly becoming a significant IT resource, which a typical organization will likely consider at some point. Be it Software-as-a-Service or Infrastructure-as-a-Service, the implications can be significant with respect to compliance with a variety of laws or regulations. The intention of this chapter is to give some insight into the potential compliance pitfalls an organization may experience if ill-prepared, and provide the tools to plan for and navigate around these obstacles before they become insurmountable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
https://www209.americanexpress.com/merchant/singlevoice/pdfs/en_GB/American%20Express%20DSOP%20for%20Merchants%20-%20UK.pdf
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
- 14.
- 15.
- 16.
- 17.
- 18.
- 19.
- 20.
- 21.
Bibliography
“Auditing the Cloud”, Grid Gurus, http://gridgurus.typepad.com/grid_gurus/2008/10/auditing-the-cl.html, October 20, 2008
Anderson R (2008) Security engineering: a guide to building dependable distributed systems. Wiley, New York
Cloud Computing: Bill of Rights. http://wiki.cloudcomputing.org/wiki/CloudComputing:Bill_of_Rights
Security Guidance for Critical Areas of Focus in Cloud Computing v2.1, Cloud Security Alliance. http://www.cloudsecurityalliance.org/csaguide.pdf, 2009
Hurley W (2009) Beautiful Security. O’Reilly Media
Jaquith A (2007) Security metrics: replacing fear, uncertainty, and doubt. Addison-Wesley Professional
Mather T (March 2, 2009) Cloud computing is on the up, but what are the security issues? Secure Computing Magazine, London
Raywood D (March 9, 2009) Data privacy clarification could lead to greater confidence in cloud computing. Secure Computing Magazine, London
Reese G (2009) Cloud application architectures: building applications and infrastructure in the cloud. O’Reilly Media
Roiter N (March 2009) How to secure cloud computing. Information Security Magazine. http://searchSecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1349670,00.html
Sherwood J (2005) Enterprise security architecture: a business-driven approach. CMP
Wood L (January 30, 2009) Cloud computing and compliance: be careful up there. ITWorld
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer London
About this chapter
Cite this chapter
Chaput, S.R., Ringwood, K. (2010). Cloud Compliance: A Framework for Using Cloud Computing in a Regulated World. In: Antonopoulos, N., Gillam, L. (eds) Cloud Computing. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84996-241-4_14
Download citation
DOI: https://doi.org/10.1007/978-1-84996-241-4_14
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84996-240-7
Online ISBN: 978-1-84996-241-4
eBook Packages: Computer ScienceComputer Science (R0)