Cloud Security Tutorials and Learning Guides

Cloud Security Tutorials and Learning Guides's learning guides and tutorials offer a variety of online information designed to arm you with the foundational and tactical cloud security information you need to deal with the increasingly challenging job of keeping your organization's information secure in the cloud.

This collection of tutorials and learning guides target specific topics on cloud security to provide you with all the resources you need in one place. Check out our collection and let us know what other guides you would like to see on Bookmark this page to check back often for new additions.

Table of contents:

Cloud Security Compliance and Governance

HIPAA cloud computing advice: Ensuring cloud computing compliance

Moving applications and data over to the cloud has its advantages, but deciding to make the move also presents several risks, especially concerning compliance. How can an enterprise ensure its cloud service provider is compliant with the Health Insurance Portability and Accountability Act (HIPAA)? Is it considered a business associate as defined by the HIPAA Privacy Rule? Is the provider devoted to maintaining compliance? This HIPAA cloud computing guide is composed of a variety of tips that offer advice on how to ensure cloud computing compliance.

Cloud computing legal issues: Developing cloud computing contracts

While cloud computing can offer enterprises a variety of benefits, there are multiple cloud computing legal issues and security risks presented by cloud computing, making negotiating of cloud computing contracts essential. This learning guide discusses several cloud computing legal issues and risks surrounding data protection and security in the cloud and highlights key provisions for developing, maintaining and terminating cloud computing contracts.

PCI and cloud computing: Cloud computing compliance guide

Staying compliant with the requirements of the PCI DSS in a cloud computing environment can be challenging for organizations which must successfully manage and maintain compliance when making the transition to the cloud. This guide discusses several aspects of PCI and cloud computing, including virtualization in the cloud, what you need to know about compliance and cloud providers, Web security in the cloud and log management.

Cloud computing risk management: Assessing key risks of cloud computing

Cloud computing is all the rage these days, but moving your data to the cloud doesn’t come without substantial risks. In addition to the data security risks, organizations need to be prepared for cloud failure, which we have seen this year with the cloud outages at Microsoft and Amazon. With these points in mind, it is critical for organizations to understand the potential risks of cloud computing and formalize the cloud computing risk management process. This guide discusses cloud computing risk management, including how organizations can prepare for cloud outages, conduct a cloud computing risk assessment and evaluate cloud providers.

Cloud Security Architecture

Cloud computing and data protection: Cloud computing encryption tutorial

Cloud computing and data protection can be tricky. When moving services to the cloud, it can be both intimidating and terrifying for an enterprise to surrender control of its sensitive data and rely solely on a cloud computing service provider to keep it safe. This cloud computing data protection guide, which is a collection of news and expert technical content, offers advice on how to secure data in the cloud and acts as a cloud computing encryption tutorial, discussing the benefits of cloud encryption, the challenges of implementing cloud encryption, as well as common use cases.

AWS security and Amazon EC2 security tutorial

Insecurities about achieving compliance in the cloud is one of the main reasons organizations are hesitant to adopt cloud computing services. This AWS security and Amazon EC2 security tutorial discusses AWS security and the basics of Amazon EC2 security, including how to secure and Amazon EC2 instances as well as strengths and weaknesses of EC2 instances from a security and compliance standpoint.