Cloud Security

Cloud Security Certification and Accreditation In this week's threaded discussion think about how to analyze and determine the risk of cloud computing. Read Cloud Security Alliance's Top Threats to Cloud Computing V1.0 report and start brainstorming ways to address the risk of these threats. Then review Cloud Security Alliance's Cloud Controls Matrix (CCM) version 3 document and start brainstorming ways to use the CCM to protect against threats identified in the previous report.
Choose two (2) different types of threats from the report and describe what they are and why they are a threat to an organization or individual. Then find two (2) different control domains within the CCM v3 list, which will help address the two (2) threats you previously identified. For each threat, describe how you would use the control domain to reduce the likelihood and impact the threat may have on an organization or individual. Then describe how you would incorporate the CCM into a certification and accreditation program. Remember to cite your sources.