Page 1001 - Cloud computing: From paradigm to operation
P. 1001

Security                                                   7


            3.1.12  Infrastructure  as  a  Service  (IaaS)  [b-ITU-T  Y.3500]:  Cloud  service  category  in  which  the  cloud
            capabilities type provided to the cloud service customer (see clause 3.1.5) is an infrastructure capabilities
            type.
            NOTE – The cloud service customer (see clause 3.1.5) does not manage or control the underlying physical and virtual
            resources, but does have control over operating systems, storage, and deployed applications that use the physical and
            virtual  resources.  The  cloud  service  customer  (see  clause  3.1.5)  may  also  have  limited  ability  to  control  certain
            networking components (e.g., host firewalls).
            3.1.13  multi-tenancy [b-ITU-T Y.3500]: Allocation of physical or virtual resources such that multiple tenants
            (see clause 3.1.24) and their computations and data are isolated from and inaccessible to one another.

            3.1.14  Network  as  a  Service  (NaaS)  [b-ITU-T  Y.3500]:  Cloud  service  category  in  which  the  capability
            provided  to the  cloud  service  customer  (see  clause  3.1.5)  is  transport connectivity and  related  network
            capabilities.
            NOTE – NaaS can provide any of the three cloud capabilities types.

            3.1.15  party [b-ISO/IEC 27729]: Natural person or legal person, whether or not incorporated, or a group of
            either.

            3.1.16  personally identifiable information  [b-ISO/IEC 29100]: Any information that (a) can be used to
            identify the PII principal to whom such information relates, or (b) is or might be directly or indirectly linked
            to a PII principal.

            3.1.17  Platform as a Service (PaaS) [b-ITU-T Y.3500]: Cloud service category in which the cloud capabilities
            type provided to the cloud service customer (see clause 3.1.5) is a platform capabilities type.

            3.1.18  private cloud [b-ITU-T Y.3500]: Cloud deployment model where cloud services (see clause 3.1.4) are
            used exclusively by a single cloud service customer (see clause 3.1.5) and resources are controlled by that
            cloud service customer (see clause 3.1.5).

            3.1.19  public cloud [b-ITU-T Y.3500]: Cloud deployment model where cloud services (see clause 3.1.4) are
            potentially available to any cloud service customer (see clause 3.1.5) and resources are controlled by the
            cloud service provider (see clause 3.1.7).
            3.1.20  security domain [b-ITU-T X.810]: A set of elements, a security policy, a security authority and a set
            of security-relevant activities in which the set of elements are subject to the security policy for the specified
            activities, and the security policy is administered by the security authority for the security domain.
            3.1.21  security incident [b-ITU-T E.409]: A security incident is any adverse event whereby some aspect of
            security could be threatened.
            3.1.22  service level agreement (SLA) [b-ISO/IEC 20000-1]: A documented agreement between the service
            provider and customer that identifies services and service targets.
            NOTE 1 – A service level agreement can also be established between the service provider and a supplier, an internal
            group or a customer acting as a supplier.
            NOTE 2 – A service level agreement can be included in a contract or another type of documented agreement.

            3.1.23  Software as a Service (SaaS) [b-ITU-T Y.3500]: Cloud service category in which the cloud capabilities
            type provided to the cloud service customer (see clause 3.1.5) is an application capabilities type.

            3.1.24  tenant [b-ITU-T Y.3500]: One or more cloud service users (see clause 3.1.8) sharing access to a set
            of physical and virtual resources.
            3.1.25  threat [b-ISO/IEC 27000]: A potential cause of an unwanted incident, which may result in harm to a
            system or organization.
            3.1.26  vulnerability [b-NIST-SP-800-30]: A weakness in an information system, system security procedures,
            internal controls, or implementation that could be exploited by a threat source.







                                                                                                         993
   996   997   998   999   1000   1001   1002   1003   1004   1005   1006