Get Started
Every time you access your email, join a video conference call or back up the photos on your smartphone, you rely on cloud computing. Cloud computing services process information on data servers located across the globe, which are colloquially known as “the cloud.” The cloud delivers computing resources over the Internet, such as storage, software, and services, creating a complex supply chain requiring extensive security protocols. Before deciding whether your business should migrate to the cloud, you should understand cloud computing’s capabilities and security risks.
Cloud Computing Security
This course covers cloud security risks and threats, basic operations, and incident response considerations, along with application, data, and infrastructure security concepts.
More Cloud Security Resources
This report highlights NSA's top ten recommended mitigation strategies that cloud customers should take to improve their security posture. Each strategy has an associated cybersecurity information sheet hyperlinked that describes it in more detail.
In this report, you will find a concise explanation of cloud security and risk management.
This resource discusses the value of SBOM-driven transparency for SaaS and offers recommendations for advancing transparency in SaaS software
This lecture provides an overview of cloud computing, including concepts and best practices for cloud architecture, design, security, and operation.
To ensure the safety of your business and your customers' information, the FTC has provided six helpful tips for businesses to follow when using cloud services.
This document divides cloud vulnerabilities into four classes (misconfiguration, poor access control, shared tenancy vulnerabilities, and supply chain vulnerabilities) that encompass the vast majority of known vulnerabilities.
This publication provides an overview of the security and privacy challenges pertinent to public cloud computing. While the document is written with Federal agencies in mind, it also highlights considerations all organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment.