Page 152 - Big data - Concept and application for telecommunications
P. 152

4                                                        Big data - Concept and application for telecommunications



                                                                               Appendix I


                                     Mapping of cloud computing security threats and challenges to security capabilities
                                                     (This appendix does not form an integral part of this Recommendation.)


            Table I.1 shows a mapping of cloud computing security threats and challenges to some of the possible security capabilities.

            The letter 'Y' in a cell formed by the intersection of the table's columns and rows designate that a particular security threat and challenge is addressed by a
            corresponding security capability.


                                              Table I.1 – Mapping of cloud computing security threats and challenges to security capabilities
                                                                                          Clause 9 Cloud computing security capabilities
                                                     Clause 9.2 Identity
                                                       and access             Clause 9.5     Clause 9.7                              Clause 9.12   Clause 9.13
                                                                Clause 9.3   Clause 9.4   Clause 9.6   Data isolation,   Clause 9.8   Clause 9.9   Clause 9.10   Clause 9.11   Clause 9.14
                                               Clause9.1  management (IAM),   Computing                                             Service security  Interoperability,
                                                                                                                              Disaster
                                                                                                                     Incident
                                                                                                      Security
                                              Trust model   authentication,   Physical   Interface   virtualization   Network   protection and   coordination   Operational   management   recovery   assessment and   portability and   Supply chain
                                                                                     security
                                                                       security
                                                                security
                                                                                                             security
                                                     authorization and        security      confidentiality                           audit   reversibility   security
                                                                                             protection
                                                      transaction audit
                                Clause 7.1.1 Data loss and
                       Clause 7.1   leakage   Y      Y          Y                          Y                                Y
                       Security
                       threats for   Clause 7.1.2 Insecure   Y   Y      Y    Y      Y
                       cloud service   service access
                       customers
             Clause 7 Security   (CSCs)   Clause 7.1.3 Insider      Y   Y                                                           Y
             threats for cloud   threats
             compu-ting
                       Clause 7.2   Clause 7.2.1 Unautho-
                       Security   rized administra-tion   Y   Y   Y   Y
                       threats for   access
                       cloud service
                       providers   Clause 7.2.2 Insider      Y   Y                                                                  Y
                       (CSPs)   threats
                                Clause 8.1.1 Ambiguity in      Y                                            Y
                                responsi-bility
                                Clause 8.1.2 Loss of trust   Y                                                                      Y
                                Clause 8.1.3 Loss of      Y     Y                          Y                Y       Y       Y       Y
                                governance
                       Clause 8.1
                       Security   Clause 8.1.4 Loss of
             Clause 8 Security   confidentiality      Y                                    Y                                        Y
             challenges for   challenges for
             cloud compu-ting   cloud service   Clause 8.1.5 Service
                       customers                                                                    Y       Y       Y       Y                         Y
                       (CSCs)   unavailability
                                Clause 8.1.6 Cloud service                                                                                   Y
                                provider lock-in
                                Clause 8.1.7
                                Misappropriation of      Y      Y                          Y                Y
                                intellectual property
            144      Security, privacy and data protection
   147   148   149   150   151   152   153   154   155   156   157