波音游戏-波音娱乐城赌球打不开

VI. Hardening Steps to Secure Cloud Computing Environment - Software as a Service

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

SaaS provides the most integrated functionality built directly into the offering, with the least customised extensibility, and a relatively high level of integrated security offered by cloud providers. From customers' perspective, implementing security in the case of SaaS means that service levels, governance, compliance, and liability expectations of the cloud services and respective providers are contractually stipulated, managed, and enforced.

1. Service Level Agreement

Universities shall assess whether security considerations are addressed in the Service Level Agreements (SLA). An adequate SLA must include a set of security standards committed by the cloud service provider, which may include the following:

 

Encryption of Sensitive Data - ensure that the cloud providers have clear policies and sufficient technologies to achieve effective data encryption.

 

 

Disaster Recovery Mechanism and Testing - ensure that the cloud providers establish proper data recovery procedures and regular drills. Universities are also recommended to specify target Recovery Time Objective (RTO) in the SLA.

 

 

Secure SDLC - ensure that the cloud providers incorporate necessary security considerations and measures when developing the software used by the universities.

 

 

Transparency - ensure that the statistics on cloud providers' security controls, system availabilities and performance are readily available for universities' tracking and monitoring.

 

 

Data Extraction - ensure that universities data kept by the cloud providers can be retrieved back in the circumstances of SLA breaches or during service interruption.

2. Compliance and Audit

Compliance needs shall be addressed in the cloud providers' standard terms of service. It is beneficial for universities to have both legal and contracts personnel involved early to ensure that cloud services contract provisions are adequate for compliance and audit obligations. Specifically, the contract terms should allow the universities to perform security audits or reviews of the cloud computing environment.

 

3. Portability and Interoperability

With SaaS, universities will substitute new software applications for old ones. The focus is on preserving or enhancing the security functionalities provided by the legacy cloud provider in order to achieve a successful data migration.

In general, universities should perform regular data extractions and backups to a format that is independent from the legacy cloud provider. The ability to migrate legacy backup data by the new cloud provider must be assessed to ensure smooth transition. Consistency in security control effectiveness should be examined on the new and old cloud service providers.

 

References:

http://www.webhostingsearch.com/articles/saas-security-issues.php
http://www.cloudsecurityalliance.org/csaguide.pdf
http://dmsconsultingllc.com/blog/2009/03/24/ensuring-saas-security/


[Previous section] [Next section]

赌场百家乐官网玩法介绍| 敖汉旗| 百家乐反缆公式| 阳江市| 百家乐学院| 百家乐官网有免费玩| 百家乐楼梯缆 | 新百家乐官网庄闲路单图记录| 网上百家乐正规代理| 网上百家乐官网怎么破解| 百家乐实时赌博| 百家乐官网龙虎的投注法| 百家乐图淑何看| 蓝盾百家乐官网赌场| 大发888娱乐城大发888大发网| 大玩家百家乐官网的玩法技巧和规则 | 7位百家乐官网扑克桌| 澳门葡京赌场图片| 保时捷百家乐娱乐城| 乐都县| 老虎机规律| 百家乐庄闲| 娱乐城百家乐官网高手| 威尼斯人娱乐城 老品牌值得信赖| 华盛顿百家乐官网的玩法技巧和规则 | 百家乐官网接线玩法| 网上百家乐是不是真的| 百家乐隐者博客| 博e百娱乐城怎么样| 百家乐透视牌靴价格| 老k百家乐官网的玩法技巧和规则| 百家乐官网看单技术| 大发888被查| 钱柜百家乐的玩法技巧和规则 | 真钱百家乐游戏| 百家乐发牌靴8| 百家乐官网波音平台路单| 易胜博| 百家乐与21点| 百家乐游戏解密| 真人百家乐官网的玩法技巧和规则 |