首页> 外文期刊>ISACA journal >Selecting the Right Cloud Operating Model Privacy and Data Security in the Cloud
【24h】

Selecting the Right Cloud Operating Model Privacy and Data Security in the Cloud

机译:在云中选择合适的云操作模型隐私和数据安全性

获取原文
获取原文并翻译 | 示例
           

摘要

While the number of services that will be cloud-supported in the future will doubtless continue to increase, selecting the right cloud deployment model is not an easy matter, especially when taking into account the various information security challenges. The presented CSEM decomposes the inherent complexity into a sequence of structured and manageable steps that help to cope with this challenge. As demonstrated, such assessments can be divided into two main parts: assessing the requirements of the service to be outsourced and evaluating the available cloud solutions for their appropriateness for the given task. The first part needs an individual C/I/A/T requirements assessment for each target service and can be performed, based on the provided questionnaire, with reasonable effort by the risk manager together with business, given that they know the concerned processes and systems well. However, the second task encompasses evaluating available cloud solutions regarding their C/I/A/T features.
机译:尽管未来将由云支持的服务数量无疑会继续增加,但是选择正确的云部署模型并不是一件容易的事,尤其是考虑到各种信息安全挑战时。提出的CSEM将固有的复杂性分解为一系列结构化和可管理的步骤,以帮助应对这一挑战。如图所示,这种评估可以分为两个主要部分:评估要外包的服务的需求,以及评估可用的云解决方案对于给定任务的适用性。第一部分需要针对每个目标服务进行单独的C / I / A / T需求评估,并且可以根据所提供的调查表在风险管理者和业务人员共同努力的前提下,根据他们所提供的调查问卷进行评估,前提是他们知道相关流程和系统好。但是,第二项任务包括评估有关C / I / A / T功能的可用云解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号