solutions create the boundary controllers as recommended by NIST to monitor and control cloud security perimeters.

The implementation of security perimeter around the cloud resources creates both a measure of control over the use of those resources and a means for monitoring access to them. 

The technology of the following supported boundary controller capabilities was reported in a recent NIST document:

  • Cloud Computing Synopsis and Recommendations (Special Publication 800-146) 
  • Encryption: Advanced Encryption Standard (AES) - FIPS PUB 197.
  • Key Exchange: Elliptic Curve Diffie-Hellman (ECDH) Key Agreement - NIST SP 800-56A.
  • Digital Signature: Elliptic Curve Digital Signature Algorithm (ECDSA) - FIPS PUB 186-3.
  • Hashing: Secure Hash Algorithm (SHA) - FIPS PUB 180-4