Page 993 - Cloud computing: From paradigm to operation
P. 993

7



                                                                                                                                                                 985

                                          Table I.1 – Mapping of cloud computing security threats and challenges to security capabilities
                                                                                    Clause 9 Cloud computing security capabilities
                                        Clause 9.2 Identity
                                          and access                                Clause 9.7 Data
                                         management   Clause 9.3   Clause 9.4   Clause 9.5   Clause 9.6   isolation,   Clause 9.8   Clause 9.9   Clause 9.11   Clause 9.12   Clause 9.13   Clause 9.14
                                  Clause9.1                         Computing                                  Clause 9.10 Incident   Service security   Interoperability,
                                  Trust model   (IAM),   Physical   Interface   virtualization   Network   protection and   Security   Operational   management   Disaster   assessment and   portability and   Supply chain
                                         authentication,   security   security   security   confidentiality   coordination   security   recovery        security
                                        authorization and            security         protection                                     audit   reversibility
                                         transaction audit
                           Clause 8.2.6
                           Bad
                           migration                      Y       Y          Y      Y        Y        Y
                           and
                           integration
                           Clause 8.2.7
                           Business
                           discon-                                                                             Y          Y
                           tinuity
                           Clause 8.2.8
                           Cloud
                           service                                                                                                                    Y
                           partner
                           lock-in
        Security      Clause 8.2   Clause 8.2.9                                                                                                       Y
                           Supply
                           chain
                    Security
                    challenges   vulnera-
                           bility
                    for cloud
                    service
                    providers   Clause
                    (CSPs)   8.2.10
                           Software                                                                                                                   Y
             Clause 8      depen-
             Security      dencies
             challenge
             s for         Clause 8.3.1
             cloud         Ambiguity      Y                                                           Y
             compu-        in responsi-
             ting          bility
                    Clause 8.3
                    Security   Clause 8.3.2
                    challenges   Misappro-
                    for cloud   priation of      Y   Y                              Y                 Y
                    service   intellectual
                    partners   property
                    (CSNs)
                           Clause 8.3.3
                           Loss of
                           software      Y                        Y                 Y
                           integrity
   988   989   990   991   992   993   994   995   996   997   998