(abuse and nefarious use of cloud computing) 云端运算的七大安全 .ppt

(abuse and nefarious use of cloud computing) 云端运算的七大安全 .ppt

  1. 1、本文档共63页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
在份文件中端安全分大域分治理其下各有分共分治理治理企管理法律子料搜法遵守稽核生命期管理可性互通性上的安全持原料中心事件理通知回用程式安全加密金管理身份存取管理化身份存取管理身份存取管理身份存取管理身份存取管理化以化基的端境承所有以往所面的安人端意程式垃圾件不告路主端意程式阻式攻社交攻中人攻漏洞作缺失端新安全因此端境的安全威程度更大如何化原的安全措施在端境中更重要散型客可以很方便地租用相同的算境挖掘其弱型客可以自建端或利用端事攻密破解境上平台弱共享源器移份管理跨主攻端新安全端新安全在年月初布了一份

在這份文件中,將雲端安全分為兩大領域,分別為治理 (Governance) 與維運 (Operation),其下各有 5 個與 7 個分類,共計 12 個分類: 治理 (Governance) 1.治理與企業風險管理 (Governance and Enterprise 2.Risk Management) 3.法律與電子資料搜尋 (Legal and Electronic Discovery) 4.法規遵守與稽核 (Compliance and Audit) 5.資訊生命週期管理 (Information Lifecycle Management) 6.可攜性與互通性 (Portability and Interoperability) 維運 (Operation) 1.傳統上的安全、業務持續與災難復原 (Traditional Security, Business Continuity, and Disaster Recovery) 2.資料中心維運 (Data Center Operations) 3.事件處理、通知與回復 (Incident Response, Notification, and Remediation) 4.應用程式安全 (Application Security) 5.加密與金鑰管理 (Encryption and Key Management) 6.身份與存取管理 (Identity and Access Management) 7.虛擬化 (Virtualization) 維運 (Operation) 6.身份與存取管理 (Identity and Access Management) Identity Provisioning: One of the major challenges for organizations adopting Cloud Computing services is the secure and timely management of on-boarding (provisioning) and off-boarding (deprovisioning) of users in the cloud. Furthermore, enterprises that have invested in user management processes within an enterprise will seek to extend those processes and practice to cloud services. cloud-based Identity and Access Management (IAM) 維運 (Operation) 6.身份與存取管理 (Identity and Access Management) Authentication: When organizations start to utilize cloud services, authenticating users in a trustworthy and manageable manner is a vital requirement. Organizations must address authentication-related challenges such as credential management, strong authentication (typically defined as multi-factor authentication), delegated authentication, and managing trust across all types of cloud services. cloud-based Identity and Access Management (IAM) 維運 (Operation) 6.身份與存取管理 (Identity and Access Management) Federation: In a Cloud Computing environment, Federated Identity Management plays a vital role in enabling organizations to authenticate their users of cloud services using the organization’s chosen identity provider (IdP). In that context, exchanging id

您可能关注的文档

文档评论(0)

wangsux + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档