Sorry, you need to enable JavaScript to visit this website.
Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Breadcrumb

  1. Home
  2. Cloud Service Adoption

Cloud Service Adoption

Get Started

Every time you access your email, join a video conference call or back up the photos on your smartphone, you rely on cloud computing. Cloud computing services process information on data servers located across the globe, which are colloquially known as “the cloud.” The cloud delivers computing resources over the Internet, such as storage, software, and services, creating a complex supply chain requiring extensive security protocols. Before deciding whether your business should migrate to the cloud, you should understand cloud computing’s capabilities and security risks. 

This course covers cloud security risks and threats, basic operations, and incident response considerations, along with application, data, and infrastructure security concepts.

Image
Folder & Globe archive logo

More Cloud Security Resources

This report highlights NSA's top ten recommended mitigation strategies that cloud customers should take to improve their security posture. Each strategy has an associated cybersecurity information sheet hyperlinked that describes it in more detail.

In this report, you will find a concise explanation of cloud security and risk management.

This resource discusses the value of SBOM-driven transparency for SaaS and offers recommendations for advancing transparency in SaaS software

This lecture provides an overview of cloud computing, including concepts and best practices for cloud architecture, design, security, and operation. 

To ensure the safety of your business and your customers' information, the FTC has provided six helpful tips for businesses to follow when using cloud services. 

This document divides cloud vulnerabilities into four classes (misconfiguration, poor access control, shared tenancy vulnerabilities, and supply chain vulnerabilities) that encompass the vast majority of known vulnerabilities. 

This publication provides an overview of the security and privacy challenges pertinent to public cloud computing. While the document is written with Federal agencies in mind, it also highlights considerations all organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment.