Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.


The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.


  1. Home
  2. Topics
  3. Cloud Service Adoption

Cloud Service Adoption

Get Started

Every time you access your email, join a video conference call or back up the photos on your smartphone, you rely on cloud computing. Cloud computing services process information on data servers located across the globe, which are colloquially known as “the cloud.” The cloud delivers computing resources over the Internet, such as storage, software, and services, creating a complex supply chain requiring extensive security protocols. Before deciding whether your business should migrate to the cloud, you should understand cloud computing’s capabilities and security risks. 

This course covers cloud security risks and threats, basic operations, and incident response considerations, along with application, data, and infrastructure security concepts.

Folder & Globe archive logo

More Cloud Security Resources

Below are some additional resources that may be useful to those considering migration to the cloud: 

Cloud Security Basics 

In this report, you will find a concise explanation of cloud security and risk management. 

Cloud Security - What Leaders Need to Know 

This lecture provides an overview of cloud computing, including concepts and best practices for cloud architecture, design, security, and operation. 

Six Steps Toward More Secure Cloud Computing 

To ensure the safety of your business and your customers' information, the FTC has provided six helpful tips for businesses to follow when using cloud services. 

Guidance on Mitigating Cloud Vulnerabilities 

This document divides cloud vulnerabilities into four classes (misconfiguration, poor access control, shared tenancy vulnerabilities, and supply chain vulnerabilities) that encompass the vast majority of known vulnerabilities. 

NIST 800-144: Guidelines on Security and Privacy in Public Cloud Computing 

This publication provides an overview of the security and privacy challenges pertinent to public cloud computing. While the document is written with Federal agencies in mind, it also highlights considerations all organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment.