CHAPTER 19

Negotiating Cloud Security Requirements with Vendors

Daniel S. Soper

California State University

Fullerton, California

Contents

19.1 Introduction

19.2 Structure-Centric Negotiation

19.3 Strategy-Centric Negotiation

19.4 Process-Centric Negotiation

19.5 Behavior-Centric Negotiation

19.6 Bad-Faith Negotiation

19.7 Integrative Negotiation

19.8 Summary

References

19.1 Introduction

Organizations of all kinds are increasingly adopting cloudsourcing in order to meet their information technology needs. Under this procurement strategy, needed IT products and services are acquired on a utility billing basis from a vendor, with the vendor retaining the responsibility of maintaining the underlying IT infrastructure. In the wake of many very ...

Get Cloud Computing Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.