Research Peer Reviews

Best Practices for Implementing a Secure Application Container Architecture

Best Practices for Implementing a Secure Application Container Architecture

Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development approaches such as Development Operations. Security needs to be embedded into these software development approaches. This document serves to identify recommendations and best practices to address the challenges in securing application containers in the engineering of trustworthy secure systems through the lens of the Developer, Operator and Architect.

Open Until: 04/22/2019
Challenges in Securing Application Containers and Microservices

Challenges in Securing Application Containers and Microservices

Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development approaches such as Development Operations. Security must be embedded into these software development approaches. This document serves to identify challenges in securing application containers and microservices in the engineering of trustworthy secure systems through the lens of the Developer, Operator and Architect.

Open Until: 04/22/2019
Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2

Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2

Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT) have proven their ability to increase security of data during transactions and provide immutable long-term data storage. This document provides several use cases for this DLT technology outside of cryptocurrencies.

Open Until: 05/02/2019
CCM v3.0.1 Addendum - FedRAMP/NIST 800-53 R4 (Moderate) v1

CCM v3.0.1 Addendum - FedRAMP/NIST 800-53 R4 (Moderate) v1

This document is an addendum to the Cloud Controls Matrix (CCM) V3.0.1 controls and aims to help bridge the gap between CCM and FedRAMP/NIST 800-53 R4 Moderate. The document includes: • Controls mapping of FedRAMP/NIST 800-53 R4 Moderate to CCM v3.0.1 . • Gap analysis

Open Until: 05/16/2019