百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

VI. Hardening Steps to Secure Cloud Computing Environment - Software as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

SaaS provides the most integrated functionality built directly into the offering, with the least customised extensibility, and a relatively high level of integrated security offered by cloud providers. From customers' perspective, implementing security in the case of SaaS means that service levels, governance, compliance, and liability expectations of the cloud services and respective providers are contractually stipulated, managed, and enforced.

1. Service Level Agreement

Universities shall assess whether security considerations are addressed in the Service Level Agreements (SLA). An adequate SLA must include a set of security standards committed by the cloud service provider, which may include the following:

 

Encryption of Sensitive Data - ensure that the cloud providers have clear policies and sufficient technologies to achieve effective data encryption.

 

 

Disaster Recovery Mechanism and Testing - ensure that the cloud providers establish proper data recovery procedures and regular drills. Universities are also recommended to specify target Recovery Time Objective (RTO) in the SLA.

 

 

Secure SDLC - ensure that the cloud providers incorporate necessary security considerations and measures when developing the software used by the universities.

 

 

Transparency - ensure that the statistics on cloud providers' security controls, system availabilities and performance are readily available for universities' tracking and monitoring.

 

 

Data Extraction - ensure that universities data kept by the cloud providers can be retrieved back in the circumstances of SLA breaches or during service interruption.

2. Compliance and Audit

Compliance needs shall be addressed in the cloud providers' standard terms of service. It is beneficial for universities to have both legal and contracts personnel involved early to ensure that cloud services contract provisions are adequate for compliance and audit obligations. Specifically, the contract terms should allow the universities to perform security audits or reviews of the cloud computing environment.

 

3. Portability and Interoperability

With SaaS, universities will substitute new software applications for old ones. The focus is on preserving or enhancing the security functionalities provided by the legacy cloud provider in order to achieve a successful data migration.

In general, universities should perform regular data extractions and backups to a format that is independent from the legacy cloud provider. The ability to migrate legacy backup data by the new cloud provider must be assessed to ensure smooth transition. Consistency in security control effectiveness should be examined on the new and old cloud service providers.

 

References:

http://www.webhostingsearch.com/articles/saas-security-issues.php
http://www.cloudsecurityalliance.org/csaguide.pdf
http://dmsconsultingllc.com/blog/2009/03/24/ensuring-saas-security/


[Previous section] [Next section]

网页百家乐的玩法技巧和规则| 盛大69棋牌游戏| 王牌百家乐的玩法技巧和规则| 百家乐官网下注技术| 娱乐城百家乐可以代理吗| 新宝百家乐官网网址| 正规百家乐官网游戏下载| 大发888投注鸿博博彩| 皇冠网百家乐官网啊| 金道博彩| 百家乐账号变动原因| 百家乐官网全自动分析软件| 缅甸百家乐视频| 新利百家乐官网的玩法技巧和规则| 全讯网开奖| 百家乐太阳城菲律宾| 网上百家乐官网信誉| 大发888如何下载| 百家乐网站赌钱吗| 澳门百家乐官网路单| 百家乐官网有不有作弊| 大发888黄金版网址| 玩百家乐有几种公式| 百利宫百家乐官网现金网| 长沙百家乐的玩法技巧和规则| 做生意办公桌摆放风水| 百家乐官网實戰後二穩賺| 大发888提款| 百家乐娱乐求解答| 百家乐网络游戏平台| 24山方向上| 真人百家乐官网游戏软件| 网络百家乐会作假吗| 百家乐官网博弈指数| 保时捷百家乐官网娱乐城| 湘潭市| 破解百家乐| 红宝石百家乐官网的玩法技巧和规则| 百家乐官网桌布专业| 颍上县| 遂川县|