APPENDIX A
Cloud Computing Security Policy Examples
When adopting cloud services, your organization needs to establish appropriate policies to instruct employees on the governance required for cloud services. Existing IT security policies should not be modified to address cloud-specific security policy statements. Rather, these directives should be included in a separate cloud security policy.
The following cloud security policies for the fictitious company ACME Incorporated are included to give you two different examples of cloud security policies. The first example has the CIO office approving all cloud adoption. This is called the centralized example. The second example shows a classification model that instructs employees on which classification ...
Get CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.