Ch16 Crypto6e
Ch16 Crypto6e
and Network
Security
Sixth Edition
by William Stallings
Terminology
Related to IEEE
802.1X
Cloud Provider
Cloud broker
• Useful when cloud services are too complex for a cloud
consumer to easily manage
• Three areas of support can be offered by a cloud broker:
• Service intermediation
• Value-added services such as identity management,
performance reporting, and enhanced security
• Service aggregation
• The broker combines multiple could services to meet
consumer needs not specifically addressed by a single
CP, or to optimize performance or minimize cost
• Service arbitrage
• A broker has the flexibility to choose services from
multiple agencies
Vietnam – Korea University
of Information and Communication Technology
Cloud Security Risks and
Countermeasures
• The Cloud Security Alliance [CSA10] lists the following
as the top cloud specific security threats, together with
suggested countermeasures:
Malicious insiders
• Countermeasures: enforce strict supply chain management and
conduct a comprehensive supplier assessment; specify human
resource requirements as part of legal contract; require transparency
into overall information security and management practices, as well as
Vietnam –compliance
Korea University reporting; determine security breach notification processes
of Information and Communication Technology
Risks and Countermeasures (continued)
Insecure Shared
Data loss or
interfaces technology
leakage
and APIs issues
Countermeasures:
implement security best
practices for
Countermeasures: installation/configuration; Countermeasures:
analyzing the security monitor environment for implement strong API
model of CP interfaces; unauthorized access control; encrypt
ensuring that strong changes/activity; and protect integrity of
authentication and promote strong data in transit; analyze
access controls are authentication and data protection at both
implemented in concert access control for design and run time;
with encryption administrative access implement strong key
machines; understanding and operations; enforce generation, storage and
the dependency chain SLAs for patching and management, and
associated with the API vulnerability remediation; destruction practices
conduct vulnerability
scanning and
configuration audits
NIST Guidelines
on Security and
Privacy Issues
and
Recommendation
s
(page 1 of 2)
NIST Guidelines
on Security and
Privacy Issues
and
Recommendation
s
(page 2 of 2)