Page 993 - Cloud computing: From paradigm to operation
P. 993
7
985
Table I.1 – Mapping of cloud computing security threats and challenges to security capabilities
Clause 9 Cloud computing security capabilities
Clause 9.2 Identity
and access Clause 9.7 Data
management Clause 9.3 Clause 9.4 Clause 9.5 Clause 9.6 isolation, Clause 9.8 Clause 9.9 Clause 9.11 Clause 9.12 Clause 9.13 Clause 9.14
Clause9.1 Computing Clause 9.10 Incident Service security Interoperability,
Trust model (IAM), Physical Interface virtualization Network protection and Security Operational management Disaster assessment and portability and Supply chain
authentication, security security security confidentiality coordination security recovery security
authorization and security protection audit reversibility
transaction audit
Clause 8.2.6
Bad
migration Y Y Y Y Y Y
and
integration
Clause 8.2.7
Business
discon- Y Y
tinuity
Clause 8.2.8
Cloud
service Y
partner
lock-in
Security Clause 8.2 Clause 8.2.9 Y
Supply
chain
Security
challenges vulnera-
bility
for cloud
service
providers Clause
(CSPs) 8.2.10
Software Y
Clause 8 depen-
Security dencies
challenge
s for Clause 8.3.1
cloud Ambiguity Y Y
compu- in responsi-
ting bility
Clause 8.3
Security Clause 8.3.2
challenges Misappro-
for cloud priation of Y Y Y Y
service intellectual
partners property
(CSNs)
Clause 8.3.3
Loss of
software Y Y Y
integrity