Page tree
Skip to end of metadata
Go to start of metadata

Resources on compliance to government regulations and standards, and on performing auditing in cloud-based systems.

Table of Contents:

Below we have compiled publicly available sources from around the world that present views on Compliance and Auditing on the Cloud.

Perspectives on Compliance and Auditing on the Cloud

Official Standards

Tools & Services

    Compliance and auditing in the AWS cloud, as part of a cloud-based security platform.
    Cloud Compliance - Apply Cloud Governance Policies to Enable Self-Service.
    Cloud PCI DSS Compliance.
    Compliance in the cloud - a logging infrastructure for compliance with PCI, HIPAA, and other regulatory standards.
    Compliant Hosting & Cloud Services.
    Helps you meet compliance requirements as data moves to the cloud by enforcing data loss prevention policies, access policies, and encrypting data stored in the cloud.
    SpringCM contracts top security firms to conduct extensive internal testing, training, assessments, design guidance, and cutting-edge technologies.

Academic Papers



Further Reading

  • Cloud Security Practices and EducationResources about how to secure cloud computing systems and learn about cloud security.
  • Cloud Computing Risks and ThreatsResources on how to identify, deal with and prevent specific cloud security threats and attacks including DDoS, API vulnerability, Shadow IT and traffic hijacking.
  • AWS SecurityResources on AWS security, security for AWS platforms like EC2, S3 and RDS, AWS monitoring, AWS configuration and security Groups, AWS firewall solutions, and more.
  • Windows Azure SecurityResources about security for Windows Azure, the cloud platform provided by Microsoft, including security measures provided by the Azure platform, how to use them, and additional security best practices for users of Windows Azure.
  • List of Cloud Security Tools and ServicesResources about tools and services specifically built to enable security in cloud computing environments.
  • Cloud Security TechnologiesResources about the technologies used to achieve cloud security - the practice of protecting data, applications, infrastructure and human interactions facilitated by cloud computing.

Dome9: AWS Network Security and Identity Protection Made Simple

Visualize. Remediate. Enforce.

Start Free Trial



  • Visualize. Remediate. Enforce.

    Bulletproof Security for AWS

    • No labels