Private Criteria in Public Cloud Standards
NIST is incorporating private sector criteria into their final standards in the U.S. Government Cloud Computing Technology Roadmap. “The road map details the steps that you need to take from where you are to where you want to be,” according to Dawn Leaf, NIST’s cloud computing executive program manager. “In this case, where we want to be in accelerated U.S. government deployment of cloud computing.” She went on to say, “We assessed the degree to which interoperability, portability and security requirements are in place, and the degree to which the standards guidance and technology are mature.”
Along with the NIST standards, the Office of Management and Budget is rolling out their plans for FedRAMP, the Federal Risk and Authorization Management Program, which is a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.
We have long seen the value in cloud computing to reduce duplication and increase the efficiency of federal and private IT programs. Once an identity service is established in the cloud, the identities are re-usable for business applications across the cloud with little or no incremental cost. The investment for establishing the identity is spread across numerous applications and can be shared across business, partners, and all participants in the cloud – re-use becomes a powerful means to manage risk and control costs.
For more information about our cloud-based identity managment platform, please contact us to speak to a specialist.
Recommended For You
Online consumers can make their purchase with various payment options, like credit card, Apple Pay or PayPal. As a result, […]
As an HR professional, it’s your priority to protect employee data. You may not realize it, but responding to employment […]
When Marketing, Sales, Credit and Collections are not in Lock Step the Risk of Something Going Wrong Increases
BusinessConnect helps departments work better together to minimize risk There’s a right way to do things, and then there’s real […]
The growth of identity fraud shows few signs of slowing and technology has enabled easier access to consumer data that […]