波音游戏源码-波音博彩公司评级_百家乐园天将_新全讯网3344111.c(中国)·官方网站

VI. Hardening Steps to Secure Cloud Computing Environment - Software as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

SaaS provides the most integrated functionality built directly into the offering, with the least customised extensibility, and a relatively high level of integrated security offered by cloud providers. From customers' perspective, implementing security in the case of SaaS means that service levels, governance, compliance, and liability expectations of the cloud services and respective providers are contractually stipulated, managed, and enforced.

1. Service Level Agreement

Universities shall assess whether security considerations are addressed in the Service Level Agreements (SLA). An adequate SLA must include a set of security standards committed by the cloud service provider, which may include the following:

 

Encryption of Sensitive Data - ensure that the cloud providers have clear policies and sufficient technologies to achieve effective data encryption.

 

 

Disaster Recovery Mechanism and Testing - ensure that the cloud providers establish proper data recovery procedures and regular drills. Universities are also recommended to specify target Recovery Time Objective (RTO) in the SLA.

 

 

Secure SDLC - ensure that the cloud providers incorporate necessary security considerations and measures when developing the software used by the universities.

 

 

Transparency - ensure that the statistics on cloud providers' security controls, system availabilities and performance are readily available for universities' tracking and monitoring.

 

 

Data Extraction - ensure that universities data kept by the cloud providers can be retrieved back in the circumstances of SLA breaches or during service interruption.

2. Compliance and Audit

Compliance needs shall be addressed in the cloud providers' standard terms of service. It is beneficial for universities to have both legal and contracts personnel involved early to ensure that cloud services contract provisions are adequate for compliance and audit obligations. Specifically, the contract terms should allow the universities to perform security audits or reviews of the cloud computing environment.

 

3. Portability and Interoperability

With SaaS, universities will substitute new software applications for old ones. The focus is on preserving or enhancing the security functionalities provided by the legacy cloud provider in order to achieve a successful data migration.

In general, universities should perform regular data extractions and backups to a format that is independent from the legacy cloud provider. The ability to migrate legacy backup data by the new cloud provider must be assessed to ensure smooth transition. Consistency in security control effectiveness should be examined on the new and old cloud service providers.

 

References:

http://www.webhostingsearch.com/articles/saas-security-issues.php
http://www.cloudsecurityalliance.org/csaguide.pdf
http://dmsconsultingllc.com/blog/2009/03/24/ensuring-saas-security/


[Previous section] [Next section]

游戏机百家乐的技术| 大发888在线下载| 百家乐官网仿水晶筹码| 百家乐官网赌牌技巧| 百家乐官网娱乐官网| 赌场百家乐怎么破解| 棋牌游戏网| 百家乐官网英皇娱乐平台| 在线百家乐纸牌游戏| 大发888网页版官网| 大发888casino组件下载| 塑料百家乐筹码| 靖江市| 网络百家乐路单图| 百家乐官网赌博出千| 百家乐神仙道礼包| 股票| 夜总会百家乐的玩法技巧和规则| 威尼斯人娱乐城最新地址| 翁源县| 柬埔寨百家乐的玩法技巧和规则| 太阳城联盟| 戒掉百家乐官网的玩法技巧和规则| 百家乐官网平注资讯| 澳门百家乐注册| 百家乐网址多少| 真钱百家乐赌博| 巴黎百家乐地址| 网络百家乐官网的信誉| 百家乐官网作弊| 大发888葡京下载地址| 最好的百家乐官网博彩公司| 百家乐赌博玩法技巧| 百家乐官网庄家胜率| 百家乐开庄概率| 玩百家乐官网技巧巧| 博彩现金开户| 百家乐官网分析仪博彩正网| 真人百家乐蓝盾赌场娱乐网规则 | 百家乐新注册送彩金| 百家乐官网平的概率|