Page 1010 - Cloud computing: From paradigm to operation
P. 1010

7                                                     Security


            10.7    Security requirements for monitoring data destruction

            The data security requirements for the monitoring data destruction include the following:
            a)      it is required that the CSP provide appropriate destruction methods for monitoring data;
            b)      it is required that the CSP prevent the unintended destruction of monitoring data;
            c)      it is required that the CSP prevent the incomplete destruction of monitoring data;
            d)      it is required that the CSP erase any CSC specific keys for encrypted data;

            e)      it is required that the CSP destroy copies of monitoring data;
            f)      it is required that the CSP provide notification of monitoring data destruction to the CSC.
            Table  10-7  provides  a  summary  mapping  of  monitoring  data  destruction  security  threats  to  security
            requirements.


                      Table 10-7 – Monitoring data destruction: security threats mapping to security requirements

                               Security threats                              Security requirements
                                  Spoofing                                     a), b), c), d), e), f)
                         Operating system vulnerability                         b), c), d), e), f)


            10.8    Security requirements for monitoring data backup
            The data security requirements for the monitoring data backup include the following:
            a)      it is required that the CSP provide backup methods to prevent monitoring data loss;
            b)      it is required that the CSP maintain the integrity and accuracy of restored monitoring data;
            c)      it is required that the CSP support logging and auditing of monitoring data restoration.

            Table 10-8 provides a summary mapping of monitoring data backup security threats to security requirements.


                        Table 10-8 – Monitoring data backup: security threats mapping to security requirements

                               Security threats                              Security requirements
                         Operating system vulnerability                            a), b), c)


































            1002
   1005   1006   1007   1008   1009   1010   1011   1012   1013   1014   1015