Page 1010 - Cloud computing: From paradigm to operation
P. 1010
7 Security
10.7 Security requirements for monitoring data destruction
The data security requirements for the monitoring data destruction include the following:
a) it is required that the CSP provide appropriate destruction methods for monitoring data;
b) it is required that the CSP prevent the unintended destruction of monitoring data;
c) it is required that the CSP prevent the incomplete destruction of monitoring data;
d) it is required that the CSP erase any CSC specific keys for encrypted data;
e) it is required that the CSP destroy copies of monitoring data;
f) it is required that the CSP provide notification of monitoring data destruction to the CSC.
Table 10-7 provides a summary mapping of monitoring data destruction security threats to security
requirements.
Table 10-7 – Monitoring data destruction: security threats mapping to security requirements
Security threats Security requirements
Spoofing a), b), c), d), e), f)
Operating system vulnerability b), c), d), e), f)
10.8 Security requirements for monitoring data backup
The data security requirements for the monitoring data backup include the following:
a) it is required that the CSP provide backup methods to prevent monitoring data loss;
b) it is required that the CSP maintain the integrity and accuracy of restored monitoring data;
c) it is required that the CSP support logging and auditing of monitoring data restoration.
Table 10-8 provides a summary mapping of monitoring data backup security threats to security requirements.
Table 10-8 – Monitoring data backup: security threats mapping to security requirements
Security threats Security requirements
Operating system vulnerability a), b), c)
1002