百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

VI. Hardening Steps to Secure Cloud Computing Environment - Software as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

SaaS provides the most integrated functionality built directly into the offering, with the least customised extensibility, and a relatively high level of integrated security offered by cloud providers. From customers' perspective, implementing security in the case of SaaS means that service levels, governance, compliance, and liability expectations of the cloud services and respective providers are contractually stipulated, managed, and enforced.

1. Service Level Agreement

Universities shall assess whether security considerations are addressed in the Service Level Agreements (SLA). An adequate SLA must include a set of security standards committed by the cloud service provider, which may include the following:

 

Encryption of Sensitive Data - ensure that the cloud providers have clear policies and sufficient technologies to achieve effective data encryption.

 

 

Disaster Recovery Mechanism and Testing - ensure that the cloud providers establish proper data recovery procedures and regular drills. Universities are also recommended to specify target Recovery Time Objective (RTO) in the SLA.

 

 

Secure SDLC - ensure that the cloud providers incorporate necessary security considerations and measures when developing the software used by the universities.

 

 

Transparency - ensure that the statistics on cloud providers' security controls, system availabilities and performance are readily available for universities' tracking and monitoring.

 

 

Data Extraction - ensure that universities data kept by the cloud providers can be retrieved back in the circumstances of SLA breaches or during service interruption.

2. Compliance and Audit

Compliance needs shall be addressed in the cloud providers' standard terms of service. It is beneficial for universities to have both legal and contracts personnel involved early to ensure that cloud services contract provisions are adequate for compliance and audit obligations. Specifically, the contract terms should allow the universities to perform security audits or reviews of the cloud computing environment.

 

3. Portability and Interoperability

With SaaS, universities will substitute new software applications for old ones. The focus is on preserving or enhancing the security functionalities provided by the legacy cloud provider in order to achieve a successful data migration.

In general, universities should perform regular data extractions and backups to a format that is independent from the legacy cloud provider. The ability to migrate legacy backup data by the new cloud provider must be assessed to ensure smooth transition. Consistency in security control effectiveness should be examined on the new and old cloud service providers.

 

References:

http://www.webhostingsearch.com/articles/saas-security-issues.php
http://www.cloudsecurityalliance.org/csaguide.pdf
http://dmsconsultingllc.com/blog/2009/03/24/ensuring-saas-security/


[Previous section] [Next section]

百家乐官网透视用设备| 在线百家乐娱乐| 百家乐官网梅花图标| 大发888娱乐场怎样下载 | 百家乐官网机械图片| 金盈会百家乐官网现金网| 澳门葡京赌场官网| 威尼斯人娱乐城| 澳门赌场招聘网| 大发888下注| bet365百科| 大发888代理充值| 皇冠现金网安全吗| 百家乐翻天下载| 大发888游戏官方下载客户端 | 百家乐官网平注法到656| 百家乐官网注码投注论坛| 宜兴市| 百家乐官网怎么才赢| 百家乐官网网真人真钱群| 百家乐官网浴盆博彩通排名| 金博士百家乐官网娱乐城| 吉利百家乐官网的玩法技巧和规则| 百家乐路子| 大发888真钱娱乐场| 开江县| 百家乐官网赢家| 仕達屋百家乐官网的玩法技巧和规则 | 狮威百家乐娱乐| 百家乐游戏筹码| 棋牌室装修效果图| 网上真钱老虎机| 在线百家乐官网官方网| 永利百家乐官网赌场娱乐网规则 | 视频百家乐平台| 大发888官网 df888| 百家乐官网技巧运气| 百家乐官网娱乐平台会员注册 | 百家乐官网视频游戏会员| 模拟百家乐官网游戏软件| 百家乐官网赢的秘籍在哪|