1.Architectural Concepts Flashcards
Cloud security considerations :
Security n privacy considerations
security n privacy considerations:
1. Confidentiality seeks to protect assets (information and systems) from unauthorized access.
2. Integrity seeks to protect those same assets against unauthorized modification.
3. Availability seeks to ensure that assets are available for authorized use when needed without disruption.
- Privacy
three new concerns: governance, auditability, and regulatory oversight.
ISO/IEC 27034
ISO/IEC 27034 is the standard for integrating security throughout
the life cycle of applications.
ISO/IEC 15408
ISO/IEC 15408 (Common Criteria) is the standard for expressing
IT security functional and assurance requirements.
ISO/IEC 17789 - Cloud Computing Reference Architecture (CCRA)
ISO/IEC 17789 Cloud Computing Reference Architecture (CCRA)
is specific to the cloud. It may be used to organize the components of a cloud architecture
into a set of common elements using common terminology
ISO/IEC 27017:2015
ISO/IEC 27017 provides guidance on the information security
aspects of cloud computing.
ISO/IEC 17788
ISO/IEC 18788
This ISO standard offers a framework and provides the principles
and requirements for the establishment, operations and management of security operations.
ISO/IEC 19441
This standard is about portability and interoperability of data.
ISO/IEC 20000-1
This ISO standard is about establishing requirements for
implementing, maintaining and continually improving a service management system (SMS).
ISO 27002
ISO/IEC 27001
ISO/IEC 27001 standard is about the establishment,
implementation, operation, monitoring, reviewing, and maintaining an Information Security
Management System (ISMS).
5 rules of evidence
Be authentic, accurate, complete, convincing and admissible in court
Privacy Level Agreement (PLA)
A PLA is similar in concept to an SLA in that it defines roles and
responsibilities as well as clearly defining service commitments for the protection of privacy
information between a service provider and consumer
The Cloud Controls Matrix (CCM)
The Cloud Controls Matrix (CCM) by Cloud Security Alliance (CSA)
is an example of a framework that can be used to determine applicable controls and their
effectiveness. This framework’s elements are specific to the cloud.
ISO/IEC 12207
ISO/IEC 12207 provides a framework around lifecycle processes
NIST SP 800-209
(SP) 800-209 provides specific guidance on storage security
NIST SP 800-88
NIST SP 800-88 provides guidelines for media sanitization.
NIST SP 800-92
Guide to
Computer Security Log Management
Data stewards
Data stewards
typically ensure that data is collected correctly
Strategic supplier
Strategic suppliers are deemed to be mission critical and cannot
be easily replaced if they become unavailable. While companies typically do business with a
few of these types of partners, they are the most crucial to the success or failure of the
enterprise cloud architecture.
Tactical supplier
Tactical suppliers supplement strategic and commodity suppliers
to manage emerging unforeseen issues and incidents
Commodity supplier
Commodity suppliers, in contrast to strategic suppliers, are
those that provide goods and services that can easily be replaced and sourced from a
variety of suppliers, if necessary.
Consensus Assessments Initiative Questionnaire (CAIQ)
(CAIQ) is a
survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to
assess the security capabilities of a cloud service provider
The CLOUD Act
The CLOUD Act gives broad powers to U.S. law enforcement
officials to force U.S.-based technology providers to release data regardless of where the
company stores data.