波音游戏源码-波音博彩公司评级_百家乐园天将_新全讯网3344111.c(中国)·官方网站

V. Hardening Steps to Secure Cloud Computing Environment - Platform as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

PaaS is intended to enable developers to build their own applications on top of the platform supported by cloud service providers. As a result, it tends to be more extensible than SaaS, at the expense of customer-ready features. In the case of PaaS, it is the responsibility of the universities' system administrators to effectively manage the same level of security measures provided by the cloud providers for protecting the underlying infrastructure components to ensure basic service availability and integrity levels.

1. Logical Access

Unauthorised access to universities' data in the cloud platform should be restricted. One of the best approaches to data access control is using the least privilege rule - i.e. access to particular data shall only be granted to authorised personnel on a need-to-know basis.

Individual users shall be authenticated on their own behalf. The universities are recommended to deploy user-centric authentication method that adopts a single set of credentials at multiple sites.

 

2. Application Development

PaaS provides a framework of building blocks to construct customised applications based on customers' own needs. Same as IaaS, application development within PaaS environment also require consideration on security throughout the SDLC.

However, since less operational controls can be obtained by PaaS customers, application design and implementation may require additional steps to achieve the same level of security as IaaS counterparts. For example, extra data encryption mechanism shall be implemented with the application logic if secure protocols (e.g. SSL, HTTPS, etc.) cannot be utilised on PaaS platform.

 

3. Portability and Interoperability

When shifting from IaaS to PaaS, vendor lock-in (dependency) turns out to be a critical security issue if a university may have to change its cloud service provider in the future, portability and interoperability must be considered. With PaaS, the expectation is that certain degree of application modification will be necessary to achieve portability. The focus is minimising the amount of program re-writing while maintaining or enhancing security controls, along with achieving a successful data migration.

When possible, the university shall develop the cloud platform components with a standard syntax and open APIs. The university should also understand:

  • What tools are available for secure data transfer, backup, and restore?
  • How base services like monitoring, logging, and auditing would transfer over to a new cloud provider?
  • What security control functions are provided by legacy cloud provider and how they would translate by the new provider?
  • What is the impact on performance and availability of the application when migrating to a new PaaS platform?

 

References:

 


[Previous section] [Next section]

郑州市| 乐至县| 金都百家乐的玩法技巧和规则| 大世界百家乐赌场娱乐网规则| bet365赞助球队| 澳门百家乐官网玩法| 百家乐庄家出千内幕| 大发888老虎机平台| 单机百家乐官网棋牌| 至尊百家乐吕文婉| 澳门银河娱乐| 做生意属虎的朝向| 柬埔寨百家乐的玩法技巧和规则| 比如县| 百家乐是骗人的| 必博备用网站| 百家乐客户端下载| 澳门赌球网| 百家乐百家乐视频| 真人娱乐城开户送钱| 现金网信誉排行| 百家乐官网新送彩金| 大发888官方6222.co| 百家乐大赢家小说| 百家乐官网网上技巧| 王子百家乐的玩法技巧和规则 | 澳门凯旋门娱乐城| 聚龍社百家乐官网的玩法技巧和规则 | 百家乐如何抽千| 永利百家乐赌场娱乐网规则| 打百家乐官网纯打庄的方法| 爱博彩到天上人间| 恒丰百家乐的玩法技巧和规则| 百家乐官网赌场论坛在线| 百家乐策略网络游戏信誉怎么样 | 蓝盾百家乐官网娱乐场开户注册 | 游戏机百家乐官网的技术| 789棋牌游戏| 百家乐街机| 真人版百家乐官网试玩| 百家乐官网体育宝贝|