CHAPTER 19

Negotiating Cloud Security Requirements with Vendors

Daniel S. Soper

California State University,

Fullerton, California

CONTENTS

19.1  Introduction

19.2  Structure-centric negotiation

19.3  Strategy-centric negotiation

19.4  Process-centric negotiation

19.5  Behavior-centric negotiation

19.6  Bad-faith negotiation

19.7  Integrative negotiation

19.8  Summary

References

19.1  INTRODUCTION

Organizations of all kinds are increasingly adopting cloud-based services to meet their information technology needs. In the wake of many very visible and embarrassing information security breaches, organizations are also increasingly aware of security-related issues with respect to their information assets. The simultaneous rise of these two phenomena ...

Get Cloud Computing Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.