Mais conteúdo relacionado Semelhante a Securing The Cloud (20) Mais de george.james (20) Securing The Cloud10. Assessing risk Cyberspace Virtualization Cloud computing Private Cloud Public Cloud Hybrid Cloud Cloudware IaaS, PaaS, SaaS 17. Assessing risk “ You must change your password every few weeks and it must be constructed from no less than twelve characters which will include a mixture of upper and lower case letters, digits and punctuation characters” 35. Is the supplier subject to external audit in the same way as conventional suppliers of outsourcing solutions? 37. Can the Cloud provider sign up to local privacy requirements on behalf of their customers? 44. To what extent do you have to account for illegal activity involving your application and/or data? 47. How would you get your data back (and port it to another platform) if you needed to? 73. Data in the cloud cannot be related to a particular individual without the ‘root index’. 74. Cloud Computing: Securing confidential information PATIENT Patient_ID Name Birth_Date Address ADMISSION Patient_ID Admission_Date Ward Consultant TEST Test_Date Specimen_ID Patient_ID Specimen_Type TEST_RESULT Test_Date Specimen_ID Test_ID Result 98. Keys should only be visible to a ‘proxy layer’ mediating between client and server