Twitter Feed
My views on “Classification of Cloud Computing Stakeholders”
In “Cloudy Times”, Markus Klems is having a good discussion on how cloud computing stakeholders classify the various infrastructure options. I then thought that it would be good for me…
Personal Views on DISA, HP and RACE
DISA and HP are clearly on the path towards cloud computing. At it’s core, net-centric operations requires the effective delivery of information to forward forces and the translation of that…
DISA selects HP for RACE
Byte and Switch reported today that the Department of Defense (DoD) has confirmed that HP will help the Defense Information Systems Agency (DISA) deploy a major cloud computing infrastructure. Grid…
Speakers for First SOA-R Event Announced
Scheduled speakers and topics for the first SOA-R Cloud Computing Education event are: Steve Armentrout, Parabon, President & CEO Grid to Cloud Computing Greg Boss, IBM, Lead Cloud Solution Architect…
Cloud Computing Offerings – A Taxonomy
From “The various level of cloud computing” by Ross Cooney Applications in the cloud: Software as a Service (SaaS). Examples include gmail, yahoo mail, Hotmail, the various search engines, wikipedia,…
Cloud Computing Guides (updated 8/10/08)
InfoWorld Special Report on Cloud Computing InformationWeek Guide to Cloud Computing InfoWorld Cloud Computing Strategy Guide Cloud Computing Product Guide A Brief History of Cloud Computing Business Week CEO Guide…
Microsoft announcing Cloud Computing offering
According to Information Week, Microsoft plans to make three important business software offerings — Exchange, Office Communications, and SharePoint — available in SaaS versions for business this year, but it’s…
Intel new CIO to examine Cloud Computing
In a ComputerworldUK article, incoming Intel CIO Diane Bryant says that she will network with fellow information chiefs, examine cloud computing and advocate using the chip giant’s internal operations as…
Cloud Computing for National Security
As the national security community considers cloud computing as an IT infrastructure option, it is surely looking at the value of the cloud in an information sharing world. Implementation of…
According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a stepping stone to a more secure government. When I first read this, my immediate reaction was a resounding, “So what!” These results tell me that US Federal Government agencies are using US Government guidance to do their US Government job. Isn’t that what you would expect? Making an impression on me would require a study across multiple industry verticals. If other industries were voluntarily using the NIST Framework, that would be saying something!
Wouldn’t you know it, but such an independent study was actually conducted earlier this year. In March of 2015, the National Cybersecurity Institute did a study of Chief Information Security Officers across multiple industries. This survey not only looked into cybersecurity practices of the US government and military, but it also delved into the security practices of other verticals including Energy/Utilities, Consulting, Information Technology and Banking/Finance. When asked about the specific security standards or frameworks their organization used, 53.1 percent of the respondents cited NIST! This response level was higher than those recorded for Information Technology Infrastructure Library (ITIL), ISO/IEC (International Organization for Standardization/International Electrotechnical Commission) HIPPA (Health Insurance Portability and Accountability Act of 1996), COBIT (Control Objectives for Information and Related Technology) and CMM (Capability Maturity Model). Yes, that impressed me.
When Paul Christman, vice president of federal for Dell Software was interviewed by FedScoop, a leading online publication that covers the US Government market, he said the framework is “just good policy”.
“It applies to schools, universities, hospitals, [the Defense Department], [the Intelligence Community], and civilian agencies. The document doesn’t say ‘This is how the government should protect the government,’ ‘This is how a bank should protect a bank.’ NIST was really trying to say ‘This wasn’t a government program or mandate;’ it’s just good practice.” Kent Landfield, director of standards and technology policy at Intel Security, echoed this sentiment saying that his company was able to fit the NIST recommendations nicely into the information technology security evaluation process as a whole.
And as if NIST had planned to stage an encore performance, two new standards – 800-173, Cloud-Adapted Risk Management Framework: Guide for Applying the Risk Management Framework to Cloud-based Federal Information Systems, and 800-174, Security and Privacy Controls for Cloud-based Federal Information Systems – are currently being drafted for released. According to Dr. Michaela Iorga, senior security technical lead for cloud computing at NIST, these new frameworks are designed to overlay and elaborate upon already-existing standards that lay out the basics for cloud architecture and security. Iorga also suggests that federal organizations should also use FedRAMP, CSA’s Security, Trust and Assurance Registry (STAR), and other certification and authorization programs to make decisions about cloud computing.
With all this new knowledge in my head, I really gained a new appreciation for NIST. The agency seems to be really taking a lead on protecting cyberspace across the board. As the economic value of our collective digital economy gains in importance, this relatively small agency has placed itself at the vanguard of cybersecurity and is truly living up to its mission:
To promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.
Thank you NIST!
(This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. Dell sponsored this article, but the opinions are my own and don’t necessarily represent Dell’s positions or strategies.)
( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2016)
This blog has been verified by Rise: Re9cb99744b65eb009b71a970003c015e
This blog has been verified by Rise: Re9cb99744b65eb009b71a970003c015e
This blog has been verified by Rise: Re9cb99744b65eb009b71a970003c015e
Cloud Computing
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- Route1 Announces Q2 2019 Financial Results
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- ChannelAdvisor to Present at the D.A. Davidson 18th Annual Technology Conference
Cybersecurity
- Route1 Announces Q2 2019 Financial Results
- FIRST US BANCSHARES, INC. DECLARES CASH DIVIDEND
- Business Continuity Management Planning Solution Market is Expected to Grow ~ US$ 1.6 Bn by the end of 2029 - PMR
- Atos delivers Quantum-Learning-as-a-Service to Xofia to enable artificial intelligence solutions
- New Ares IoT Botnet discovered on Android OS based Set-Top Boxes