百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

VI. Hardening Steps to Secure Cloud Computing Environment - Software as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

SaaS provides the most integrated functionality built directly into the offering, with the least customised extensibility, and a relatively high level of integrated security offered by cloud providers. From customers' perspective, implementing security in the case of SaaS means that service levels, governance, compliance, and liability expectations of the cloud services and respective providers are contractually stipulated, managed, and enforced.

1. Service Level Agreement

Universities shall assess whether security considerations are addressed in the Service Level Agreements (SLA). An adequate SLA must include a set of security standards committed by the cloud service provider, which may include the following:

 

Encryption of Sensitive Data - ensure that the cloud providers have clear policies and sufficient technologies to achieve effective data encryption.

 

 

Disaster Recovery Mechanism and Testing - ensure that the cloud providers establish proper data recovery procedures and regular drills. Universities are also recommended to specify target Recovery Time Objective (RTO) in the SLA.

 

 

Secure SDLC - ensure that the cloud providers incorporate necessary security considerations and measures when developing the software used by the universities.

 

 

Transparency - ensure that the statistics on cloud providers' security controls, system availabilities and performance are readily available for universities' tracking and monitoring.

 

 

Data Extraction - ensure that universities data kept by the cloud providers can be retrieved back in the circumstances of SLA breaches or during service interruption.

2. Compliance and Audit

Compliance needs shall be addressed in the cloud providers' standard terms of service. It is beneficial for universities to have both legal and contracts personnel involved early to ensure that cloud services contract provisions are adequate for compliance and audit obligations. Specifically, the contract terms should allow the universities to perform security audits or reviews of the cloud computing environment.

 

3. Portability and Interoperability

With SaaS, universities will substitute new software applications for old ones. The focus is on preserving or enhancing the security functionalities provided by the legacy cloud provider in order to achieve a successful data migration.

In general, universities should perform regular data extractions and backups to a format that is independent from the legacy cloud provider. The ability to migrate legacy backup data by the new cloud provider must be assessed to ensure smooth transition. Consistency in security control effectiveness should be examined on the new and old cloud service providers.

 

References:

http://www.webhostingsearch.com/articles/saas-security-issues.php
http://www.cloudsecurityalliance.org/csaguide.pdf
http://dmsconsultingllc.com/blog/2009/03/24/ensuring-saas-security/


[Previous section] [Next section]

竞咪百家乐官网的玩法技巧和规则 | 百家乐胜率在哪| 百家乐庄闲符号记| 亲朋棋牌官方下载| 牌九百家乐官网的玩法技巧和规则 | 百家乐官网赌博经历| 大发888娱乐登录| 百家乐官网视频地主| 百家乐视频看不到| 大发888真人真钱游戏| 融水| 真人百家乐口诀| 威尼斯人娱乐城图| 百家乐官网有看牌器吗| 马牌百家乐娱乐城| 澳门顶级赌场网址| 申请百家乐会员送彩金| 大庆冠通棋牌下载| 新加坡百家乐官网的玩法技巧和规则 | 百家乐官网庄闲的分布| 百家乐官网真人赌场娱乐网规则 | 百家乐官网娱乐平台会员注册| 现金百家乐攻略| 周至县| 乐亭县| 百家乐官网娱乐城有几家| 罗盘24山度数| 亚洲顶级赌场的微博| 百家乐官网77scs| 太阳城娱乐城申博| 伟易博百家乐官网娱乐城| 大发888娱乐场1888| 百家乐官网国际赌场娱乐网规则 | 百家乐官网群shozo| 新宝百家乐官网网址| 百家乐视频二人雀神| 玛纳斯县| 网上百家乐真的假的| 百家乐官网美女荷官| 川宜百家乐破解版| 百家乐官网那个平台信誉高|