Date Published: November 2018
Comments Due: January 11, 2019 (public comment period is CLOSED)
Email Questions to: firstname.lastname@example.org
Planning Note (11/20/2018):
11/20/18 - 1/11/19: Comment Period for Volume B: Approach, Architecture, and Security Characteristics [Prelim. Draft 1] This preliminary draft is stable but has some gaps in its content that will be addressed in the next draft.
Michael Bartock (NIST), Murugiah Souppaya (NIST), Karen Scarfone (NIST), Daniel Carroll (Dell/EMC), Robert Masten (Dell/EMC), Gina Scinta (Gemalto), Paul Massis (Gemalto), Hemma Prafullchandra (HyTrust), Jason Malnar (HyTrust), Harmeet Singh (IBM), Raghuram Yeluri (Intel), Tim Shea (RSA), Michael Dalton (RSA), Anthony Dukes (VMware), Carlos Phoenix (VMware), Brenda Swarts (VMware)
The National Cybersecurity Center of Excellence (NCCoE) at NIST recognizes the need to address security and privacy challenges for the use of shared cloud services in hybrid cloud architectures, and has launched this project. This project is using commercially available technologies to develop a cybersecurity reference design that can be implemented to increase security and privacy for cloud workloads on hybrid cloud platforms.
This project will demonstrate how the implementation and use of trusted compute pools not only will provide assurance that workloads in the cloud are running on trusted hardware and are in a trusted geolocation, but also will improve the protections for the data within workloads and flowing between workloads. This project will result in a NIST Cybersecurity Practice Guide - a publicly available description of the solution and practical steps needed to implement a cybersecurity reference design that addresses this challenge.
Keywords cybersecurity; cloud technology; compliance; privacy; trusted compute pools