Reflecting on Whether Checklists Can Tick the Box for Cloud Security

Robert Anderson Keith Duncan, Mark Whittington

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Downloads (Pure)

Abstract

All Cloud computing standards are dependent upon checklist methodology to implement and then audit the alignment of a company or an operation with the standards that have been set. An investigation of the use of checklists in other academic areas has shown there to be significant weaknesses in the checklist solution to both implementation and audit; these weaknesses will only be exacerbated by the fast-changing and developing nature of clouds. We examine the problems that are inherent with using checklists and seek to identify some mitigating strategies that might be adopted to improve their efficacy.
Original languageEnglish
Title of host publication2014 IEEE 6th International Conference on Cloud Computing Technology and Science
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages805-810
Number of pages6
ISBN (Print)9781479940929
Publication statusPublished - 18 Dec 2014
Event2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom) - Nanyang Executive Centre, Nanyang Technological University, Singapore, Singapore
Duration: 15 Aug 201618 Aug 2016
http://cipsijoomla.ux.uis.no/cloudcom2014/

Conference

Conference2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom)
Abbreviated titleCloudCom 2014
CountrySingapore
CitySingapore
Period15/08/1618/08/16
Internet address

Keywords

  • security
  • standards
  • compliance
  • assurance
  • audit

Fingerprint Dive into the research topics of 'Reflecting on Whether Checklists Can Tick the Box for Cloud Security'. Together they form a unique fingerprint.

Cite this