CHAPTER 19

Negotiating Cloud Security Requirements with Vendors

Daniel S. Soper

California State University,

Fullerton, California

CONTENTS

19.1  Introduction

19.2  Structure-centric negotiation

19.3  Strategy-centric negotiation

19.4  Process-centric negotiation

19.5  Behavior-centric negotiation

19.6  Bad-faith negotiation

19.7  Integrative negotiation

19.8  Summary

References

19.1  INTRODUCTION

Organizations of all kinds are increasingly adopting cloud-based services to meet their information technology needs. In the wake of many very visible and embarrassing information security breaches, organizations are also increasingly aware of security-related issues with respect to their information assets. The simultaneous rise of these two phenomena ...

Get Cloud Computing Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.