﻿{"id":150,"date":"2017-10-18T00:00:00","date_gmt":"2017-10-17T16:00:00","guid":{"rendered":""},"modified":"2018-12-14T10:48:35","modified_gmt":"2018-12-14T02:48:35","slug":"proposed-security-assessment-authorization-for-u-s-government-cloud-compu","status":"publish","type":"post","link":"http:\/\/www.nlpir.org\/wordpress\/2017\/10\/18\/proposed-security-assessment-authorization-for-u-s-government-cloud-compu\/","title":{"rendered":"Proposed Security Assessment &amp; Authorization for U.S. Government Cloud Compu"},"content":{"rendered":"<p><P>\u7f16\u8005\u6309\uff1a\u672c\u62a5\u544a\u662f2010\u5e74\uff0c\u7531\u7f8e\u56fdCIO\u59d4\u5458\u4f1a\u9488\u5bf9\u7f8e\u56fd\u653f\u5e9c\u4e91\u8ba1\u7b97\u670d\u52a1\u7684\u5b89\u5168\u8bc4\u4f30\u4e0e\u6388\u6743\u5efa\u8bae\u62a5\u544a\uff0c\u6c47\u805a\u4e86\u7f8e\u56fd\u56fd\u5bb6\u6807\u51c6\u7814\u7a76\u9662\u3001\u901a\u7528\u670d\u52a1\u7ba1\u7406\u5c40\u3001CIO\u59d4\u5458\u4f1a18\u4e2a\u6708\u7684\u667a\u6167\uff0c\u975e\u5e38\u503c\u5f97\u4e2d\u56fd\u653f\u5e9c\u5728\u76f2\u76ee\u6295\u5165\u4e91\u8ba1\u7b97\u4e4b\u524d\u5b66\u4e60\u548c\u8bc4\u4f30\u3002<\/P><br \/>\n<P>Proposed Security Assessment &amp; Authorization for U.S. Government Cloud Computing<\/P><br \/>\n<P>Over the past 18 months, an inter-agency team comprised of the National Institute<BR>of Standards and Technology (NIST), General Services Administration (GSA), the CIO<BR>Council and working bodies such as the Information Security and Identity Management<BR>Committee (ISIMC), has worked on developing the Proposed Security Assessment and<BR>Authorization for U.S. Government Cloud Computing. This team evaluated security<BR>controls and multiple Assessment and Authorization models for U.S. Government Cloud<BR>Computing as outlined in this document.<\/P><br \/>\n<P>The attached document is a product of 18 months of collaboration with State and<BR>Local Governments, Private Sector, NGO\u2019s and Academia. This marks an early step<BR>toward our goal of deploying secure cloud computing services to improve performance<BR>and lower the cost of government operations, but we need to improve this document<BR>through your input.<BR>Often stated, but still true, we recognize that we do not have a monopoly on the<BR>best ideas. We seek your input, knowledge, and experience to help us frame appropriate<BR>security controls and processes for the Federal Government\u2019s journey to cloud<BR>computing. The attached document is a draft and is designed to encourage robust debate<BR>on the best path forward.<BR>Comments on the documents should be submitted online at <A href=\"http:\/\/www.FedRAMP.gov\">www.FedRAMP.gov<\/A> by<BR>December 2nd . We look forward to your active engagement and substantive comments.<BR>Vivek Kundra<BR>U.S. Chief Information Officer<\/P><br \/>\n<P><A href=\"http:\/\/www.nlpir.org\/wordpress\/attachments\/2011\/04\/Proposed-Security-Assessment-and-Authorization-for-Cloud-Computing.pdf\" target=_blank><IMG border=0 src=\"http:\/\/www.nlpir.org\/images\/base\/attachment.gif\"> Proposed-Security-Assessment-and-Authorization-for-Cloud-Computing.pdf(864 KB)<\/A><\/P><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u7f16\u8005\u6309\uff1a\u672c\u62a5\u544a\u662f2010\u5e74\uff0c\u7531\u7f8e\u56fdCIO\u59d4\u5458\u4f1a\u9488\u5bf9\u7f8e\u56fd\u653f\u5e9c\u4e91\u8ba1\u7b97\u670d\u52a1\u7684\u5b89\u5168\u8bc4\u4f30\u4e0e &hellip; <a href=\"http:\/\/www.nlpir.org\/wordpress\/2017\/10\/18\/proposed-security-assessment-authorization-for-u-s-government-cloud-compu\/\">\u7ee7\u7eed\u9605\u8bfb <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38],"tags":[],"_links":{"self":[{"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/posts\/150"}],"collection":[{"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/comments?post=150"}],"version-history":[{"count":1,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/posts\/150\/revisions"}],"predecessor-version":[{"id":1452,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/posts\/150\/revisions\/1452"}],"wp:attachment":[{"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/media?parent=150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/categories?post=150"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/tags?post=150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}