Industry collaboration is a key factor in driving security in cloud computing

Jan 20, 2012 15:44 GMT  ·  By

The latest installment of the Trustworthy Computing

Cloud Fundamentals Video Series brings to the spotlight the need to build a trusted cloud ecosystem.

When it comes to computing ecosystems, security industry associations are of great importance, Microsoft notes. The Redmond-based software giant itself is part of some associations and also helps to sponsor others more.

Some of these include: Information Systems Audit and Control Association (ISACA), the International Information Systems Security Certification Consortium (ISC2), the Information Systems Security Association (ISSA), the Cloud Security Alliance (CSA).

The company is also actively involved in a series of key CSA research initiatives, including the CloudSIRT initiative, the Cloud Controls Matrix (CCM) initiative, the Consensus Assessments Initiative, and the Security as a Service initiative.

As part of these initiatives, experts from across the industry are working together to come up with guidance, education and best practices in areas concerning security in cloud computing.

Microsoft recognizes the importance of these initiatives, and so does Jim Reavis, the founder and executive director of the Cloud Security Alliance (CSA), who can be seen in the video embedded below.

Tim Rains, director, Trustworthy Computing, cites Jim Reavis saying: "each day, a growing number of companies decide to leverage cloud computing for important business activities.”

“There is an immediate and compelling mandate for all of us to become better informed as to how cloud computing functions, its key benefits and considerations to establishing trust.

“CSA is committed to building the trusted cloud ecosystem and we salute Microsoft’s efforts to both build robust and secure cloud services as well as offering a cloud educational series in the public interest.”

Have a look at the video below to learn some more details on what Jim Reavis has to say on collaboration to ensure security on cloud computing. This is the fourth video in the Trustworthy Computing Cloud Fundamentals Series, and more are expected to come.