Page 153 - Big data - Concept and application for telecommunications
P. 153
Big data - Concept and application for telecommunications 4
Table I.1 – Mapping of cloud computing security threats and challenges to security capabilities
Clause 9 Cloud computing security capabilities
Clause 9.2 Identity Clause 9.7
and access Clause 9.3 Clause 9.4 Clause 9.5 Clause 9.6 Data isolation, Clause 9.8 Clause 9.9 Clause 9.10 Clause 9.11 Clause 9.12 Clause 9.13 Clause 9.14
Clause9.1 management (IAM), Computing Service security Interoperability,
Incident
Disaster
Security
Trust model authentication, Physical Interface virtualization Network protection and coordination Operational management recovery assessment and portability and Supply chain
security
security
security
security
security
confidentiality
authorization and security protection audit reversibility
transaction audit
Clause 8.1.8 Loss of Y Y Y
software integrity
Clause 8.2.1 Ambiguity in Y Y
responsi-bility
Clause 8.2.2 Shared Y Y Y
environment
Clause 8.2.3 Inconsis-
tency and conflict of Y Y
protection mechanisms
Clause 8.2
Security Clause 8.2.4 Jurisdic-tional
Clause 8 Security Y Y
challenges for challenges for conflict
cloud compu-ting cloud service
providers Clause 8.2.5 Evolution-ary Y Y Y
(CSPs) risks
Clause 8.2.6 Bad migration Y Y Y Y Y Y
and integration
Clause 8.2.7 Business Y Y
discon-tinuity
Clause 8.2.8 Cloud service Y
partner lock-in
Clause 8.2 Clause 8.2.9 Supply chain Y
Security vulnera-bility
challenges for
cloud service Clause 8.2.10 Software
providers depen-dencies Y
(CSPs)
Clause 8 Security
challenges for Clause 8.3.1 Ambiguity in Y Y
cloud compu-ting Clause 8.3 responsi-bility
Security Clause 8.3.2 Misappro-
challenges for Y Y Y Y
cloud service priation of intellectual
property
partners
(CSNs) Clause 8.3.3 Loss of
software integrity Y Y Y
Security, privacy and data protection 145