Page 1003 - Cloud computing: From paradigm to operation
P. 1003

Security                                                   7


            SaaS    Software as a Service

            SIM     Subscriber Identity Module
            SLA     Service Level Agreement

            VM      Virtual Machine


            5       Conventions
            In this Recommendation:
            The keywords "is required to" indicate a requirement which must be strictly followed and from which no
            deviation is permitted, if conformance to this Recommendation is to be claimed.

            The keywords "is recommended" indicate a requirement which is recommended but which is not absolutely
            required. Thus, this requirement need not be present to claim conformance.

            The keywords "is prohibited from" indicate a requirement which must be strictly followed and from which
            no deviation is permitted, if conformance to this Recommendation is to be claimed.

            The keywords "can optionally" indicate an optional requirement which is permissible, without implying any
            sense of being recommended. This term is not intended to imply that the vendor's implementation must
            provide the option, and the feature can be optionally enabled by the network operator/service provider.
            Rather,  it  means  the  vendor  may  optionally  provide  the  feature  and  still  claim  conformance  with  the
            specification.


            6       Overview

            This Recommendation analyses data security requirements for the monitoring service of cloud computing
            including monitoring data scope, monitoring data lifecycle, security threats and challenges, and monitoring
            data security requirements of cloud computing.

            Monitoring  data  scope  describes  two  types  of  cloud  monitoring  data:  necessary  and  optional,  and  also
            explains the use cases.

            Monitoring data lifecycle, and the security threats and challenges, describe the content and security threats
            and  challenges  of  cloud  monitoring  data  collection,  storage,  use,  migration,  analysis,  presentation,
            destruction and backup.

            Monitoring data security requirements describes the detailed requirements for each lifecycle stage of cloud
            monitoring data.


            7       Scope of monitoring data for cloud computing

            In a cloud computing environment, there are two types of monitoring data: necessary monitoring data and
            optional monitoring data.

            Necessary monitoring data is that which is used to maintain service level agreements (SLAs). Necessary
            monitoring  data  can  help  the  CSP  run  the  cloud  computing  platform  securely  and  stably.  Necessary
            monitoring data may include, but is not limited to, management system monitoring data, physical resources
            monitoring data and network monitoring data. Necessary monitoring data is mainly used by CSPs but could
            also be shared with CSCs.
            Optional monitoring data is that which is provided at the request of the CSC to provide the monitoring service
            by the CSP. Optional monitoring data may include, but is not be limited to, virtual machine monitoring data,
            data  storage  service  monitoring  data  and  the  CSCs'  data  associated  with  the  monitoring  of  their  own
            application on cloud.







                                                                                                         995
   998   999   1000   1001   1002   1003   1004   1005   1006   1007   1008