6 Cloud Computing Security Policy and Requirements

6-1 Security Policy

Information must be protected from unauthorized access, use, disclosure, disruption, modification, or destruction to help ensure integrity, confidential­ity, and availability.