All Cloud computing standards are dependent upon checklist methodology to implement and then audit the alignment of a company or an operation with the standards that have been set. An investigation of the use of checklists in other academic areas has shown there to be significant weaknesses in the checklist solution to both implementation and audit; these weaknesses will only be exacerbated by the fast-changing and developing nature of clouds. We examine the problems that are inherent with using checklists and seek to identify some mitigating strategies that might be adopted to improve their efficacy.
|Title of host publication||2014 IEEE 6th International Conference on Cloud Computing Technology and Science|
|Publisher||Institute of Electrical and Electronics Engineers (IEEE)|
|Number of pages||6|
|Publication status||Published - 18 Dec 2014|
|Event||2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom) - Nanyang Executive Centre, Nanyang Technological University, Singapore, Singapore|
Duration: 15 Aug 2016 → 18 Aug 2016
|Conference||2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom)|
|Abbreviated title||CloudCom 2014|
|Period||15/08/16 → 18/08/16|
Duncan, R. A. K., & Whittington, M. (2014). Reflecting on Whether Checklists Can Tick the Box for Cloud Security. In 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (pp. 805-810). Institute of Electrical and Electronics Engineers (IEEE).