Page 153 - Big data - Concept and application for telecommunications
P. 153

Big data - Concept and application for telecommunications                                               4


                                              Table I.1 – Mapping of cloud computing security threats and challenges to security capabilities

                                                                                          Clause 9 Cloud computing security capabilities
                                                     Clause 9.2 Identity                     Clause 9.7
                                                       and access   Clause 9.3   Clause 9.4   Clause 9.5   Clause 9.6   Data isolation,   Clause 9.8   Clause 9.9   Clause 9.10   Clause 9.11   Clause 9.12   Clause 9.13   Clause 9.14
                                               Clause9.1  management (IAM),   Computing                                             Service security  Interoperability,
                                                                                                                     Incident
                                                                                                                              Disaster
                                                                                                      Security
                                              Trust model   authentication,   Physical   Interface   virtualization   Network   protection and   coordination   Operational   management   recovery   assessment and   portability and   Supply chain
                                                                security
                                                                                     security
                                                                                                             security
                                                                       security
                                                                                                                                                        security
                                                                                            confidentiality
                                                     authorization and        security       protection                               audit   reversibility
                                                      transaction audit
                                Clause 8.1.8 Loss of      Y                  Y             Y
                                software integrity
                                Clause 8.2.1 Ambiguity in      Y                                            Y
                                responsi-bility
                                Clause 8.2.2 Shared                          Y      Y      Y
                                environment
                                Clause 8.2.3 Inconsis-
                                tency and conflict of                                               Y                                        Y
                                protection mechanisms
                       Clause 8.2
                       Security   Clause 8.2.4 Jurisdic-tional
             Clause 8 Security                                                             Y                Y
             challenges for   challenges for   conflict
             cloud compu-ting   cloud service
                       providers   Clause 8.2.5 Evolution-ary                                               Y                                Y        Y
                       (CSPs)   risks
                                Clause 8.2.6 Bad migration            Y      Y      Y      Y        Y       Y
                                and integration
                                Clause 8.2.7 Business                                                               Y       Y
                                discon-tinuity
                                Clause 8.2.8 Cloud service                                                                                            Y
                                partner lock-in
                       Clause 8.2   Clause 8.2.9 Supply chain                                                                                         Y
                       Security   vulnera-bility
                       challenges for
                       cloud service   Clause 8.2.10 Software
                       providers   depen-dencies                                                                                                      Y
                       (CSPs)
             Clause 8 Security
             challenges for     Clause 8.3.1 Ambiguity in      Y                                            Y
             cloud compu-ting  Clause 8.3   responsi-bility
                       Security   Clause 8.3.2 Misappro-
                       challenges for                Y          Y                          Y                Y
                       cloud service   priation of intellectual
                                property
                       partners
                       (CSNs)   Clause 8.3.3 Loss of
                                software integrity      Y                    Y             Y




                                                                                                                   Security, privacy and data protection   145
   148   149   150   151   152   153   154   155   156   157   158