08 - Module 8
08 - Module 8
Availability • Ensures that resources are accessible to all consumers by adhering to BC practices
Service assurance • Ensures that SLOs are met by dedicating runtime resources and QoS control
Management • Enables end-to-end infrastructure and service management for service providers
• Provides ability to delegate day-to-day management activities to the consumers
• Mitigation requires:
– Strong and robust security enforcement
– Containment mechanisms
Data created • Data ownership remains with the creator based on factors such as:
on-premise – Contractual ownership
and then – Copyright law
stored in the – Trade secret
cloud – Intellectual property
Occur when a cloud service provider or cloud broker does not adhere to, and
demonstrating adherence to external laws and regulations as well as
corporate policies and procedures.
Mechanisms Description
Security and personnel policies or standard procedures to direct the
Administrative
safe execution of various operations
Usually implemented through tools or devices deployed on computer
Technical
systems, networks, or storage
• Entities involved in
authorization:
– Resource owner
– Resource server
– Client
– Authorization server
Active Monitoring tools transmit data between two endpoints that are monitored
Passive Information about a link or device is collected by probing the link or device
A security tool that automates the process of detecting and preventing events
that can compromise the confidentiality, integrity, or availability of IT
resources.
Refers to the provision of security applications and services via the cloud
either to cloud-based infrastructure and software or from the cloud to the
customers’ on-premise systems. This will enable enterprises to make use of
security services in new ways, or in ways that would not be cost effective if
provisioned locally.
— Cloud Security Alliance, “Security as a Service” Version 1.0 (2011)
Act of adhering to, and demonstrating adherence to, external laws and
regulations, corporate policies and procedures, service provider's own
demands, consumers' demands, and/or the demands of participating cloud
providers (in case of hybrid cloud and cloud brokers).
Ensures that the cloud services, service creation processes, and cloud
infrastructure resources adhere to relevant policies and legal requirements.
A process that determines the validity and reliability of information about the
enforcement of controls presented by a provider. Audit also provides an
assessment of the cloud provider’s control mechanisms and their ability to
provide the consumers, the logs required to verify the mechanisms.