百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

VI. Hardening Steps to Secure Cloud Computing Environment - Software as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

SaaS provides the most integrated functionality built directly into the offering, with the least customised extensibility, and a relatively high level of integrated security offered by cloud providers. From customers' perspective, implementing security in the case of SaaS means that service levels, governance, compliance, and liability expectations of the cloud services and respective providers are contractually stipulated, managed, and enforced.

1. Service Level Agreement

Universities shall assess whether security considerations are addressed in the Service Level Agreements (SLA). An adequate SLA must include a set of security standards committed by the cloud service provider, which may include the following:

 

Encryption of Sensitive Data - ensure that the cloud providers have clear policies and sufficient technologies to achieve effective data encryption.

 

 

Disaster Recovery Mechanism and Testing - ensure that the cloud providers establish proper data recovery procedures and regular drills. Universities are also recommended to specify target Recovery Time Objective (RTO) in the SLA.

 

 

Secure SDLC - ensure that the cloud providers incorporate necessary security considerations and measures when developing the software used by the universities.

 

 

Transparency - ensure that the statistics on cloud providers' security controls, system availabilities and performance are readily available for universities' tracking and monitoring.

 

 

Data Extraction - ensure that universities data kept by the cloud providers can be retrieved back in the circumstances of SLA breaches or during service interruption.

2. Compliance and Audit

Compliance needs shall be addressed in the cloud providers' standard terms of service. It is beneficial for universities to have both legal and contracts personnel involved early to ensure that cloud services contract provisions are adequate for compliance and audit obligations. Specifically, the contract terms should allow the universities to perform security audits or reviews of the cloud computing environment.

 

3. Portability and Interoperability

With SaaS, universities will substitute new software applications for old ones. The focus is on preserving or enhancing the security functionalities provided by the legacy cloud provider in order to achieve a successful data migration.

In general, universities should perform regular data extractions and backups to a format that is independent from the legacy cloud provider. The ability to migrate legacy backup data by the new cloud provider must be assessed to ensure smooth transition. Consistency in security control effectiveness should be examined on the new and old cloud service providers.

 

References:

http://www.webhostingsearch.com/articles/saas-security-issues.php
http://www.cloudsecurityalliance.org/csaguide.pdf
http://dmsconsultingllc.com/blog/2009/03/24/ensuring-saas-security/


[Previous section] [Next section]

老江死了| 百家乐官网平台出租家乐平台出租 | 太阳神百家乐官网的玩法技巧和规则 | 大发888游戏平台hg dafa888gw| 商水县| 百家乐庄闲最佳打法| 百家乐官网乐城皇冠| 百家乐官网计划软件| 网上百家乐官网的赌博网站| 百家乐技巧玩法技巧| 路单百家乐官网的玩法技巧和规则| 棋牌室营业执照| 百家乐官网平台在线| 大发888加速器| 百家乐官网奥| 威尼斯人娱乐场it| 做生意的好风水| 新利棋牌游戏| 百家乐官网赌博租| 百家乐最低下注| 游艇会娱乐城| 永利高百家乐会员| 球探比分 | 百家乐官网暗红色桌布| 全讯网高手论坛| 澳门百家乐官网小| 百家乐官网赢钱公式冯耕| 大发888无数| 永利高百家乐现金网| 网上百家乐官网心得| 国美百家乐官网的玩法技巧和规则 | 澳门百家乐破解| 蒙特卡罗娱乐场| 全讯网找a3322.com| 百家乐官网看炉子的方法| 棋牌室赚钱吗| 免费百家乐统计工具| 蓝盾百家乐官网代理打| 百家乐2号技术打法| 电子百家乐官网技巧| 大发888游戏平台寒怕|