Transcription of DEPARTMENT OF DEFENSE (DoD) Secure Cloud Computing ...
{{id}} {{{paragraph}}}
I DEPARTMENT OF DEFENSE (DoD) Secure Cloud Computing Architecture (SCCA) Functional Requirements 1/ 31/2017 Developed by the DEFENSE Information Systems Agency (DISA) for the DEPARTMENT of DEFENSE (DoD)i TABLE OF CONTENTS Executive Summary .. 1 1 Introduction .. 2 Scope .. 2 DISN Boundary Security .. 2 DoD Cloud Hosted System Security .. 3 Cloud Governance .. 3 Implementation Guidance .. 3 Secure Cloud Computing Architecture Technical Components and Topology .. 3 DoD Cloud Security Guidance .. 6 Networks and Topology .. 6 Cybersecurity Capabilities .. 9 Roles and Responsibilities .. 9 Capability Modularity, Decoupling and Applicability .. 10 Applicable Security Policies .. 11 Reference Documents .. 12 2 Functional Requirements.
communication networks. Additionally, these systems employ the CSP’s Identity and Access Management (IdAM) systems which may not be federated with an authorized DoD IdAM system. While the governance model typically applies well for IaaS and some PaaS offerings, it …
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}