<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shankar+Babu+Chebrolu</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shankar+Babu+Chebrolu"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Shankar_Babu_Chebrolu"/>
		<updated>2026-05-09T05:41:56Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=117278</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=117278"/>
				<updated>2011-09-13T19:23:16Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
According to Gartner, by 2012, 20% of businesses will adopt cloud services and own no IT assets. Goal of the project is to maintain a list of top 10 security risks faced with the Cloud* Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers.&lt;br /&gt;
&lt;br /&gt;
* Most of the risks are based on the assumption that Cloud is a public or a hybrid cloud&lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list.&lt;br /&gt;
&lt;br /&gt;
Also refer the recent presentation - http://www.owasp.org/images/4/47/Cloud-Top10-Security-Risks.pdf&lt;br /&gt;
&lt;br /&gt;
{{:OWASP Cloud ‐ 10/Initial Pre-Alpha List of OWASP Cloud Top 10 Security Risks}}&lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Risk Criteria:&lt;br /&gt;
&lt;br /&gt;
#Easily Executable&lt;br /&gt;
#Most Damaging&lt;br /&gt;
#Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Alpha Release ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (Dec 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Jan 2010) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (Jan-Feb 2010)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Beta Release  ==&lt;br /&gt;
&lt;br /&gt;
# Writeup to be finished by April 5th (All)&lt;br /&gt;
# Provide feedback by April 19th&lt;br /&gt;
# Incorporate all the comments feedback by 26th April&lt;br /&gt;
# Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (April 3rd 2010) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Taxonomy  ====&lt;br /&gt;
&lt;br /&gt;
== Terms ==&lt;br /&gt;
&lt;br /&gt;
== Diagrams ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Dr. Shankar Babu Chebrolu]]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Pankaj Telang|Pankaj Telang]]&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Ove Hansen|Ove Hansen]]&lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Ludovic_Petit|Ludovic Petit]]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Salvatore Di Blasi|Salvatore Di Blasi]]&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}}---&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Project Details ====&lt;br /&gt;
{{:Projects/OWASP Cloud ‐ 10 Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=117277</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=117277"/>
				<updated>2011-09-13T19:18:58Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
According to Gartner, by 2012, 20% of businesses will adopt cloud services and own no IT assets. Goal of the project is to maintain a list of top 10 security risks faced with the Cloud* Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers.&lt;br /&gt;
&lt;br /&gt;
* Most of the risks are based on the assumption that Cloud is a public or a hybrid cloud&lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list.&lt;br /&gt;
&lt;br /&gt;
Also refer the recent presentation - http://www.owasp.org/images/4/47/Cloud-Top10-Security-Risks.pdf&lt;br /&gt;
&lt;br /&gt;
{{:OWASP Cloud ‐ 10/Initial Pre-Alpha List of OWASP Cloud Top 10 Security Risks}}&lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Risk Criteria:&lt;br /&gt;
&lt;br /&gt;
#Easily Executable&lt;br /&gt;
#Most Damaging&lt;br /&gt;
#Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Alpha Release ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (Dec 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Jan 2010) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (Jan-Feb 2010)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Beta Release  ==&lt;br /&gt;
&lt;br /&gt;
# Writeup to be finished by April 5th (All)&lt;br /&gt;
# Provide feedback by April 19th&lt;br /&gt;
# Incorporate all the comments feedback by 26th April&lt;br /&gt;
# Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (April 3rd 2010) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Taxonomy  ====&lt;br /&gt;
&lt;br /&gt;
== Terms ==&lt;br /&gt;
&lt;br /&gt;
== Diagrams ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Dr. Shankar Babu Chebrolu]]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Pankaj Telang|Pankaj Telang]]&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Ove Hansen|Ove Hansen]]&lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Ludovic_Petit|Ludovic Petit]]&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/User:Salvatore_Di_Blasi]&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}}---&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Project Details ====&lt;br /&gt;
{{:Projects/OWASP Cloud ‐ 10 Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Service_and_Data_Integration&amp;diff=100253</id>
		<title>Cloud-10 Service and Data Integration</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Service_and_Data_Integration&amp;diff=100253"/>
				<updated>2011-01-13T12:44:40Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==R6: Service and Data Integration ==&lt;br /&gt;
&lt;br /&gt;
Gartner published extensive research on cloud services intermediaries called cloud services brokerages, which would enhance and enrich cloud services in terms of performance etc and help improve cloud adoption. &lt;br /&gt;
&lt;br /&gt;
Cloud consumers that are planning to adopt cloud and cloud services brokerages must make sure that their proprietary data is adequately protected as it traverses through the internet between the end user and the cloud data center(s). Cloud computing models increase the risks associated with interception of data in transit, eventhough these risks are not unique to cloud. Cloud providers must ensure that they use SSL and/or tighter encryption protocols to secure data in transit.&lt;br /&gt;
Increasingly complex integration and the dynamics in cloud computing present significant challenges to timely diagnosis and resolution of incidents such as malware detection and immediate intrusion response to mitigate the impact (Gupta, 2009; Christodorescu, Sailer, Schales, Sgandurra &amp;amp; Zamboni, 2009). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Babcock, C. (2009, September). Hybrid Clouds. InformationWeek,(1240), 15-19.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1865633581). &lt;br /&gt;
&lt;br /&gt;
Byrne, T. (2009, April). Clouding Over. EContent, 32(3), 37.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1675328451). &lt;br /&gt;
de Assuncao, M. D., di Costanzo, A., &amp;amp; Buyya, R. (2009). Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters. Paper presented at the HPDC '09: Proceedings of the 18th ACM International Symposium on High Performance Distributed Computing, Garching, Germany. 141-150. &lt;br /&gt;
&lt;br /&gt;
Hoover, J. (2009, April). GE Puts The Cloud Model To The Test. InformationWeek,(1226), 32-33.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1682898981). &lt;br /&gt;
&lt;br /&gt;
Gupta, R., Prasad, K. H., Luan, L., Rosu, D., &amp;amp; Ward, C. (2009). Multi-dimensional knowledge integration for efficient incident management in a services cloud. Paper presented at the SCC '09: Proceedings of the 2009 IEEE International Conference on Services Computing, 57-64&lt;br /&gt;
&lt;br /&gt;
Christodorescu, M., Sailer, R., Schales, D. L., Sgandurra, D., &amp;amp; Zamboni, D. (2009). Cloud security is not (just) virtualization security: A short paper. Paper presented at the CCSW '09: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, Illinois, USA. 97-102&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=92156</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=92156"/>
				<updated>2010-10-31T19:01:02Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
According to Gartner, by 2012, 20% of businesses will adopt cloud services and own no IT assets. Goal of the project is to maintain a list of top 10 security risks faced with the Cloud* Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers.&lt;br /&gt;
&lt;br /&gt;
* Most of the risks are based on the assumption that Cloud is a public or a hybrid cloud&lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list.&lt;br /&gt;
&lt;br /&gt;
Also refer the recent presentation - http://www.owasp.org/images/4/47/Cloud-Top10-Security-Risks.pdf&lt;br /&gt;
&lt;br /&gt;
== Initial pre-alpha list of OWASP Cloud Top 10 Security Risks  ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Accountability_and_Data_Ownership R1 - Accountability and Data Ownership]&lt;br /&gt;
| A traditional data center of an organization is under complete control of that organization. The organization logically and physically protects the data it owns. An organization that chooses to use a public cloud for hosting its business service loses control of its data. This poses critical security risks that the organization needs to carefully consider and mitigate. (Pankaj, Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Identity_Federation R2 - User Identity Federation]&lt;br /&gt;
| It is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides.   (Vinay, Pankaj)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Regulatory_Compliance R3 - Regulatory Compliance]&lt;br /&gt;
|  - Complex to Demonstrate regulatory compliance. Data that is perceived to be secure in one country may not be perceived secure in another due to different regulatory laws across countries or regions. For eg., European Union has very strict privacy laws and hence data stored in US may not comply with those EU laws. (Shankar, Ove)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Business_Continuity_and_Resiliency R4 - Business Continuity and Resiliency] &lt;br /&gt;
| Business Continuity is an activity an IT organization performs to ensure that the business can be conducted in a disaster situation. In case of an organization that uses cloud, the responsibility of business continuity gets delegated to the cloud provider. This creates a risk to the organization of not having appropriate business continuity. (Pankaj, Shankar)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Privacy_and_Secondary_Usage_of_Data R5 - User Privacy and Secondary Usage of Data]&lt;br /&gt;
|  User's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users  (Vinay) - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination.  (Vinay, Ove)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Service_and_Data_Integration R6 - Service and Data Integration] &lt;br /&gt;
| Organizations must be sure that their proprietary data is adequately protected as it is transferred between the end user and the cloud data center. While interception of data in transit should be of concern to every organization, the risk is much greater for organizations utilizing a cloud computing model, where data is transmitted over the Internet. Unsecured data is susceptible to interception and compromise during transmission. (Shankar, Ove)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Multi_Tenancy_and_Physical_Security R7 - Multi Tenancy and Physical Security] &lt;br /&gt;
| Multi-tenancy in cloud means sharing of resources and services among multiple clients(CPU, networking, storage/databases, application stack). It increases dependence on logical segregation and other controls to ensure that one tenant deliberately or inadvertently can not interfere with the security ( confidentiality, integrity, availability) of the other tenants. (Vinay, Pankaj)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Incidence_Analysis_and_Forensic_Support R8 - Incidence Analysis and Forensic Support]&lt;br /&gt;
|In the event of a security incident, applications and services hosted at a cloud provider are difficult to investigate as logging may be distributed across multiple hosts and data centers which could be located in various countries and hence governed by different laws. Also, along with log files, data belonging to multiple customers may be co-located on the same hardware and storage devices and hence a concern for law enforcing agencies for forensic recovery.  (Shankar, Ove)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Infrastructure_Security R9 - Infrastructure Security]&lt;br /&gt;
| All infrastructure must be hardened and configured securely, and the hardening/configuration baselines should be based on Industry Best Practices. Applications, systems and networks must be architected and configured with tiering and security zones, and access must be configured to only allow required network and application protocols. Administrative access must be role-based, and granted on a need-to-know basis. Regular risk assessments must be done, preferably by an independent party. A policy and process must be in place for patching/security updates, and can based on risk/threat assessments of new security issues. (Ove, Shankar)&lt;br /&gt;
&lt;br /&gt;
Although the fine details of the items above must be regarded as highly sensitive information, it is reasonable to expect a customer to want to see at least the high-level details. The Provider must be willing to provide this. &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Nonproduction_Environment_Exposure R10 - Non Production Environment Exposure] &lt;br /&gt;
| An IT organization that develops software applications internally employs a set of non-production environments for design, development, and test activities. The non-production environments are generally not secured to the same extent as the production environment. If an organization uses a cloud provider for such non-production environment, then there is a high risk of unauthorized access, information modification, and information theft. (Pankaj, Ove)&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Cloud - Security Risks&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Cloud-10 Candidates  ==&lt;br /&gt;
&lt;br /&gt;
* exposure to non-prod and internal environments &lt;br /&gt;
*Integration between cloud and internally hosted services &lt;br /&gt;
*Patching and Vulnerability Management &lt;br /&gt;
*Lack of Transparency in Internal Security Controls and difficulty/complexity of auditing &lt;br /&gt;
*Enterprise Intranets exposed directly on Internet (if they move on a Public Cloud)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This needs to be debated and for each of these we may need to add a separate page-holder with the following details. &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigation and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Risk Criteria:&lt;br /&gt;
&lt;br /&gt;
#Easily Executable&lt;br /&gt;
#Most Damaging&lt;br /&gt;
#Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Alpha Release ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (Dec 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Jan 2010) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (Jan-Feb 2010)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Beta Release  ==&lt;br /&gt;
&lt;br /&gt;
# Writeup to be finished by April 5th (All)&lt;br /&gt;
# Provide feedback by April 19th&lt;br /&gt;
# Incorporate all the comments feedback by 26th April&lt;br /&gt;
# Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (April 3rd 2010) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Taxonomy  ====&lt;br /&gt;
&lt;br /&gt;
== Terms ==&lt;br /&gt;
&lt;br /&gt;
== Diagrams ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Dr. Shankar Babu Chebrolu]]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Pankaj Telang|Pankaj Telang]]&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Ove Hansen|Ove Hansen]]&lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Shankar_Babu_Chebrolu&amp;diff=92155</id>
		<title>User:Shankar Babu Chebrolu</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Shankar_Babu_Chebrolu&amp;diff=92155"/>
				<updated>2010-10-31T19:00:11Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Dr. Shankar Babu Chebrolu, CISSP is an IT Security Architect responsible for securing web based applications in Customer Value Chain Management at Cisco Systems, working closely with Cisco Supply Chain partners, Application Service Providers, Solution Vendors and Corporate Security Programs Organization (CSPO). He has worked at Cisco for about 10 years. Shankar Babu Chebrolu has been a speaker at a number of professional conferences including Siebel Customer World 2005, Oracle Open World 2006, Oracle Applications User Group 2007, CA World 2007, Triangle InfoseCon 2008 and 2010, ISSA-Raleigh Chapter 20009 presenting in his areas of expertise: securing web applications and integrating third party security models within Cisco Enterprise. Shankar earned his PhD in Information Technology from Capella University, Minneapolis and earned his Master's Degree in Computer Science &amp;amp; Engineering from Indian Institute of Technology (IIT), Mumbai, India.&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:ENISA_Cloud_Computing_Common_Assurance_Metrics&amp;diff=84079</id>
		<title>Industry:ENISA Cloud Computing Common Assurance Metrics</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:ENISA_Cloud_Computing_Common_Assurance_Metrics&amp;diff=84079"/>
				<updated>2010-05-27T19:09:25Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Activity Name'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''ENISA Common Assurance Maturity Model''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Description''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Collaborate with ENISA on their Cloud Computing Common Assurance Metrics project during 2010&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects ''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[[:Category:OWASP Cloud ‐ 10 Project]]&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Primary'''&amp;lt;br&amp;gt;Shankar Babu Chebrolu&amp;lt;br&amp;gt;Vinay Bansal&amp;lt;br&amp;gt;Colin Watson&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secondary'''&amp;lt;br&amp;gt;TBC&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;Use [https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Cloud 10 Project Mailing List]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Contribute to ENISA's project as contributors or reviewers&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Deadlines''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Q1 2010 - Agree Scope&lt;br /&gt;
** 05 Feb 2010 - Receive CAM Briefing Pack&lt;br /&gt;
** 12 Feb 2010 - Respond to ENISA about participation&lt;br /&gt;
** 16 Feb 2010 - OWASP Conference call with OWASP participants (CW/SC/VB/DC)&lt;br /&gt;
** 19 Feb 2010 - ENISA initial project conference call&lt;br /&gt;
** 15 Mar 2010 - Initial meeting in Barcelona at [http://www.cloudsecurityalliance.org/sc2010.html SecureCloud 2010]&lt;br /&gt;
* Q2 2010 - Develop Framework&lt;br /&gt;
** 04 May Sub-domain &amp;quot;development&amp;quot; assigned to OWASP team&lt;br /&gt;
** 21 May 2010 - Framework meeting in London&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Status''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* In Progress&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Resources''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment ENISA Report on Cloud Computing]&lt;br /&gt;
[http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-information-assurance-framework?searchterm=cloud ENISA Information Assurance Framework]&lt;br /&gt;
[http://www.cloudsecurityalliance.org/cm.html Cloud Security Alliance Cloud Controls Matrix]&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=82918</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=82918"/>
				<updated>2010-05-03T13:57:00Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* Goal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
According to Gartner, by 2012, 20% of businesses will adopt cloud services and own no IT assets. Goal of the project is to maintain a list of top 10 security risks faced with the Cloud* Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers.&lt;br /&gt;
&lt;br /&gt;
* Most of the risks are based on the assumption that Cloud is a public or a hybrid cloud&lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list. &lt;br /&gt;
&lt;br /&gt;
== Initial pre-alpha list of OWASP Cloud Top 10 Security Risks  ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Accountability_and_Data_Ownership R1 - Accountability and Data Ownership]&lt;br /&gt;
| A traditional data center of an organization is under complete control of that organization. The organization logically and physically protects the data it owns. An organization that chooses to use a public cloud for hosting its business service loses control of its data. This poses critical security risks that the organization needs to carefully consider and mitigate. (Pankaj, Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Identity_Federation R2 - User Identity Federation]&lt;br /&gt;
| It is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides.   (Vinay, Pankaj)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Regulatory_Compliance R3 - Regulatory Compliance]&lt;br /&gt;
|  - Complex to Demonstrate regulatory compliance. Data that is perceived to be secure in one country may not be perceived secure in another due to different regulatory laws across countries or regions. For eg., European Union has very strict privacy laws and hence data stored in US may not comply with those EU laws. (Shankar, Ove)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Business_Continuity_and_Resiliency R4 - Business Continuity and Resiliency] &lt;br /&gt;
| Business Continuity is an activity an IT organization performs to ensure that the business can be conducted in a disaster situation. In case of an organization that uses cloud, the responsibility of business continuity gets delegated to the cloud provider. This creates a risk to the organization of not having appropriate business continuity. (Pankaj, Shankar)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Privacy_and_Secondary_Usage_of_Data R5 - User Privacy and Secondary Usage of Data]&lt;br /&gt;
|  User's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users  (Vinay) - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination.  (Vinay, Ove)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Service_and_Data_Integration R6 - Service and Data Integration] &lt;br /&gt;
| Organizations must be sure that their proprietary data is adequately protected as it is transferred between the end user and the cloud data center. While interception of data in transit should be of concern to every organization, the risk is much greater for organizations utilizing a cloud computing model, where data is transmitted over the Internet. Unsecured data is susceptible to interception and compromise during transmission. (Shankar, Ove)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Multi_Tenancy_and_Physical_Security R7 - Multi Tenancy and Physical Security] &lt;br /&gt;
| Multi-tenancy in cloud means sharing of resources and services among multiple clients(CPU, networking, storage/databases, application stack). It increases dependence on logical segregation and other controls to ensure that one tenant deliberately or inadvertently can not interfere with the security ( confidentiality, integrity, availability) of the other tenants. (Vinay, Pankaj)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Incidence_Analysis_and_Forensic_Support R8 - Incidence Analysis and Forensic Support]&lt;br /&gt;
|In the event of a security incident, applications and services hosted at a cloud provider are difficult to investigate as logging may be distributed across multiple hosts and data centers which could be located in various countries and hence governed by different laws. Also, along with log files, data belonging to multiple customers may be co-located on the same hardware and storage devices and hence a concern for law enforcing agencies for forensic recovery.  (Shankar, Ove)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Infrastructure_Security R9 - Infrastructure Security]&lt;br /&gt;
| All infrastructure must be hardened and configured securely, and the hardening/configuration baselines should be based on Industry Best Practices. Applications, systems and networks must be architected and configured with tiering and security zones, and access must be configured to only allow required network and application protocols. Administrative access must be role-based, and granted on a need-to-know basis. Regular risk assessments must be done, preferably by an independent party. A policy and process must be in place for patching/security updates, and can based on risk/threat assessments of new security issues. (Ove, Shankar)&lt;br /&gt;
&lt;br /&gt;
Although the fine details of the items above must be regarded as highly sensitive information, it is reasonable to expect a customer to want to see at least the high-level details. The Provider must be willing to provide this. &lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Nonproduction_Environment_Exposure R10 - Non Production Environment Exposure] &lt;br /&gt;
| An IT organization that develops software applications internally employs a set of non-production environments for design, development, and test activities. The non-production environments are generally not secured to the same extent as the production environment. If an organization uses a cloud provider for such non-production environment, then there is a high risk of unauthorized access, information modification, and information theft. (Pankaj, Ove)&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Cloud - Security Risks&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Cloud-10 Candidates  ==&lt;br /&gt;
&lt;br /&gt;
* exposure to non-prod and internal environments &lt;br /&gt;
*Integration between cloud and internally hosted services &lt;br /&gt;
*Patching and Vulnerability Management &lt;br /&gt;
*Lack of Transparency in Internal Security Controls and difficulty/complexity of auditing &lt;br /&gt;
*Enterprise Intranets exposed directly on Internet (if they move on a Public Cloud)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This needs to be debated and for each of these we may need to add a separate page-holder with the following details. &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigation and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Risk Criteria:&lt;br /&gt;
&lt;br /&gt;
#Easily Executable&lt;br /&gt;
#Most Damaging&lt;br /&gt;
#Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Alpha Release ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (Dec 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Jan 2010) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (Jan-Feb 2010)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Beta Release  ==&lt;br /&gt;
&lt;br /&gt;
# Writeup to be finished by April 5th (All)&lt;br /&gt;
# Provide feedback by April 19th&lt;br /&gt;
# Incorporate all the comments feedback by 26th April&lt;br /&gt;
# Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (April 3rd 2010) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Taxonomy  ====&lt;br /&gt;
&lt;br /&gt;
== Terms ==&lt;br /&gt;
&lt;br /&gt;
== Diagrams ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Shankar Babu Chebrolu]]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Pankaj Telang|Pankaj Telang]]&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Ove Hansen|Ove Hansen]]&lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Service_and_Data_Integration&amp;diff=81225</id>
		<title>Cloud-10 Service and Data Integration</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Service_and_Data_Integration&amp;diff=81225"/>
				<updated>2010-04-12T14:09:06Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* R6: Service and Data Integration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==R6: Service and Data Integration ==&lt;br /&gt;
&lt;br /&gt;
Companies that are planning to adopt cloud must make sure that their proprietary data is adequately protected as it traverses through the internet between the end user and the cloud data center(s). Cloud computing models increase the risks associated with interception of data in transit, eventhough these risks are not unique to cloud. Cloud providers must ensure that they use SSL and/or tighter encryption protocols to secure data in transit.&lt;br /&gt;
Increasingly complex integration and the dynamics in cloud computing present significant challenges to timely diagnosis and resolution of incidents such as malware detection and immediate intrusion response to mitigate the impact (Gupta, 2009; Christodorescu, Sailer, Schales, Sgandurra &amp;amp; Zamboni, 2009). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Babcock, C. (2009, September). Hybrid Clouds. InformationWeek,(1240), 15-19.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1865633581). &lt;br /&gt;
&lt;br /&gt;
Byrne, T. (2009, April). Clouding Over. EContent, 32(3), 37.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1675328451). &lt;br /&gt;
de Assuncao, M. D., di Costanzo, A., &amp;amp; Buyya, R. (2009). Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters. Paper presented at the HPDC '09: Proceedings of the 18th ACM International Symposium on High Performance Distributed Computing, Garching, Germany. 141-150. &lt;br /&gt;
&lt;br /&gt;
Hoover, J. (2009, April). GE Puts The Cloud Model To The Test. InformationWeek,(1226), 32-33.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1682898981). &lt;br /&gt;
&lt;br /&gt;
Gupta, R., Prasad, K. H., Luan, L., Rosu, D., &amp;amp; Ward, C. (2009). Multi-dimensional knowledge integration for efficient incident management in a services cloud. Paper presented at the SCC '09: Proceedings of the 2009 IEEE International Conference on Services Computing, 57-64&lt;br /&gt;
&lt;br /&gt;
Christodorescu, M., Sailer, R., Schales, D. L., Sgandurra, D., &amp;amp; Zamboni, D. (2009). Cloud security is not (just) virtualization security: A short paper. Paper presented at the CCSW '09: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, Illinois, USA. 97-102&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Service_and_Data_Integration&amp;diff=81223</id>
		<title>Cloud-10 Service and Data Integration</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Service_and_Data_Integration&amp;diff=81223"/>
				<updated>2010-04-12T13:49:44Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* R6: Service and Data Integration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==R6: Service and Data Integration ==&lt;br /&gt;
&lt;br /&gt;
Companies that are planning to adopt cloud must make sure that their proprietary data is adequately protected as it traverses through the internet between the end user and the cloud data center(s). Cloud computing models increase the risks associated with interception of data in transit, eventhough these risks are not unique to cloud. Cloud providers must ensure that they use SSL and/or tighter encryption protocols to secure data in transit.&lt;br /&gt;
Increasingly complex integration and the dynamics in cloud computing present significant challenges to timely diagnosis and resolution of incidents such as malware detection and immediate intrusion response to mitigate the impact (Gupta, 2009; Christodorescu, Sailer, Schales, Sgandurra &amp;amp; Zamboni, 2009). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Babcock, C. (2009, September). Hybrid Clouds. InformationWeek,(1240), 15-19.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1865633581). &lt;br /&gt;
&lt;br /&gt;
Byrne, T. (2009, April). Clouding Over. EContent, 32(3), 37.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1675328451). &lt;br /&gt;
de Assuncao, M. D., di Costanzo, A., &amp;amp; Buyya, R. (2009). Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters. Paper presented at the HPDC '09: Proceedings of the 18th ACM International Symposium on High Performance Distributed Computing, Garching, Germany. 141-150. Retrieved from http://doi.acm.org.library.capella.edu/10.1145/1551609.1551635 &lt;br /&gt;
&lt;br /&gt;
Hoover, J. (2009, April). GE Puts The Cloud Model To The Test. InformationWeek,(1226), 32-33.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1682898981). &lt;br /&gt;
&lt;br /&gt;
Gupta, R., Prasad, K. H., Luan, L., Rosu, D., &amp;amp; Ward, C. (2009). Multi-dimensional knowledge integration for efficient incident management in a services cloud. Paper presented at the SCC '09: Proceedings of the 2009 IEEE International Conference on Services Computing, 57-64&lt;br /&gt;
&lt;br /&gt;
Christodorescu, M., Sailer, R., Schales, D. L., Sgandurra, D., &amp;amp; Zamboni, D. (2009). Cloud security is not (just) virtualization security: A short paper. Paper presented at the CCSW '09: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, Illinois, USA. 97-102&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Regulatory_Compliance&amp;diff=81222</id>
		<title>Cloud-10 Regulatory Compliance</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Regulatory_Compliance&amp;diff=81222"/>
				<updated>2010-04-12T13:46:54Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* R3: Regulatory Compliance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==R3: Regulatory Compliance ==&lt;br /&gt;
&lt;br /&gt;
Customers are ultimately responsible for the security and compliance with regulatory laws (e.g., SOX, HIPAA etc) of their own applications that are hosted in cloud. Data stewards and application owners must plan to put timely audits in place to ensure proper controls in the applications and infrastructure that is hosted at a cloud provider. Companies that are planning to adopt cloud (SaaS, Iaas, Paas etc) must ensure that their cloud provider understand the respective roles and responsbilities (RACI etc) in helping out customers in maintaining required compliance with the appropriate regulatory laws and standards (government and commercial). &lt;br /&gt;
IT managers are likely to push back on cloud adoption due to the fear of losing control of their resources to outside cloud providers who can change the underlying technology or implementation or both without customer’s consent which may have implications on regulatory compliance due to lack of transparency (Sullivan, 2009; Chow et al., 2009). IT organizations should analyze whether or not a move to the cloud makes sense with a risk management framework that incorporates data protection and compliance requirements and by making sure that the data protection, availability and key management expectations are well defined into the service level agreements (Getgen, 2009). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References: &lt;br /&gt;
&lt;br /&gt;
Anthes, G.. (2009, January). SaaS Realities. Computerworld, 43(1), 21-22. Retrieved August 9, 2009, from ABI/INFORM Global. (Document ID: 1626575741). &lt;br /&gt;
&lt;br /&gt;
Business: Pain in the aaS; Computer security. (2008, April). The Economist, 387(8577), 86. Retrieved August 9, 2009, from ABI/INFORM Global. (Document ID: 1469385981). &lt;br /&gt;
&lt;br /&gt;
Gartner: Seven Cloud-Computing Security Risks. http://www.cio.com/article/423713/Gartner_Seven_Cloud_Computing_Security_Risks?page=1&amp;amp;taxonomyId=1419 &lt;br /&gt;
&lt;br /&gt;
Google: Cloud computing more secure than traditional IT. http://www.computerweekly.com/Articles/2009/07/21/236982/cloud-computing-more-secure-than-traditional-it-says.htm &lt;br /&gt;
&lt;br /&gt;
Top five cloud computing security issues. http://www.computerweekly.com/Articles/2009/04/24/235782/top-five-cloud-computing-security-issues.htm &lt;br /&gt;
&lt;br /&gt;
Cloud Security Alliance. http://www.cloudsecurityalliance.org/csaguide.pdf &lt;br /&gt;
&lt;br /&gt;
O'Sullivan, D. (2009). The internet cloud with a silver lining. The British Journal of Administrative Management.&lt;br /&gt;
&lt;br /&gt;
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., &amp;amp; Molina, J. (2009). Controlling data in the cloud: Outsourcing computation without outsourcing control. Paper presented at the CCSW '09: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, Illinois, USA&lt;br /&gt;
&lt;br /&gt;
Getgen, K. (2009, October). 2009 Encryption and key management industry benchmark report. Trust Catalyst white paper on Risk Management for data protection. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=77075</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=77075"/>
				<updated>2010-01-29T15:43:52Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* Initial pre-alpha list of OWASP Cloud Top 10 Security Risks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
Goal of the project is to maintain a list of top 10 security risks faced with the Cloud Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list. &lt;br /&gt;
&lt;br /&gt;
== Initial pre-alpha list of OWASP Cloud Top 10 Security Risks  ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Accountability_and_Data_Ownership R1 - Accountability and Data Ownership]&lt;br /&gt;
| Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Identity_Federation R2 - User Identity Federation]&lt;br /&gt;
| It is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides.   (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Regulatory_Compliance R3 - Regulatory Compliance]&lt;br /&gt;
|  - Complex to Demonstrate regulatory compliance. Data that is perceived to be secure in one country may not be perceived secure in another due to different regulatory laws across countries or regions. For eg., European Union has very strict privacy laws and hence data stored in US may not comply with those EU laws. (Shankar)&lt;br /&gt;
|-&lt;br /&gt;
| R4 - Business Continuity and Resiliency &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Privacy_and_Secondary_Usage_of_Data R5 - User Privacy and Secondary Usage of Data]&lt;br /&gt;
|  User's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users  (Vinay) - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination.  (Vinay)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Service_and_Data_Integration R6 - Service and Data Integration] &lt;br /&gt;
| Organizations must be sure that their proprietary data is adequately protected as it is transferred between the end user and the cloud data center. While interception of data in transit should be of concern to every organization, the risk is much greater for organizations utilizing a cloud computing model, where data is transmitted over the Internet. Unsecured data is susceptible to interception and compromise during transmission. (Shankar)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Multi_Tenancy_and_Physical_Security R7 - Multi Tenancy and Physical Security] &lt;br /&gt;
| Vinay&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Incidence_Analysis_and_Forensic_Support R8 - Incidence Analysis and Forensic Support]&lt;br /&gt;
|In the event of a security incident, applications and services hosted at a cloud provider are difficult to investigate as logging may be distributed across multiple hosts and data centers which could be located in various countries and hence governed by different laws. Also, along with log files, data belonging to multiple customers may be co-located on the same hardware and storage devices and hence a concern for law enforcing agencies for forensic recovery.  (Shankar)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Infrastructure_Security R9 - Infrastructure Security]&lt;br /&gt;
| -Vinay&lt;br /&gt;
|-&lt;br /&gt;
| R10 - Non Production Environment Exposure &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Cloud - Security Risks&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Cloud-10 Candidates  ==&lt;br /&gt;
&lt;br /&gt;
* exposure to non-prod and internal environments &lt;br /&gt;
*Integration between cloud and internally hosted services &lt;br /&gt;
*Patching and Vulnerability Management &lt;br /&gt;
*Lack of Transparency in Internal Security Controls and difficulty/complexity of auditing &lt;br /&gt;
*Enterprise Intranets exposed directly on Internet (if they move on a Public Cloud)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This needs to be debated and for each of these we may need to add a separate page-holder with the following details. &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigation and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Risk Criteria:&lt;br /&gt;
&lt;br /&gt;
#Easily Executable&lt;br /&gt;
#Most Damaging&lt;br /&gt;
#Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Alpha Release ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (Dec 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Jan 2010) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (Jan-Feb 2010)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Beta Release  ==&lt;br /&gt;
&lt;br /&gt;
#Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (April 2010) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Taxonomy  ====&lt;br /&gt;
&lt;br /&gt;
== Terms ==&lt;br /&gt;
&lt;br /&gt;
== Diagrams ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Shankar Babu Chebrolu]]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Pankaj Telang|Pankaj Telang]]&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang]&lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Service_and_Data_Integration&amp;diff=75413</id>
		<title>Cloud-10 Service and Data Integration</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Service_and_Data_Integration&amp;diff=75413"/>
				<updated>2009-12-22T21:27:45Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* R6: Service and Data Integration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==R6: Service and Data Integration ==&lt;br /&gt;
&lt;br /&gt;
Companies that are planning to adopt cloud must make sure that their proprietary data is adequately protected as it traverses through the internet between the end user and the cloud data center(s). Cloud computing models increase the risks associated with interception of data in transit, eventhough these risks are not unique to cloud. Cloud providers must ensure that they use SSL and/or tighter encryption protocols to secure data in transit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Babcock, C. (2009, September). Hybrid Clouds. InformationWeek,(1240), 15-19.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1865633581). &lt;br /&gt;
&lt;br /&gt;
Byrne, T. (2009, April). Clouding Over. EContent, 32(3), 37.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1675328451). &lt;br /&gt;
de Assuncao, M. D., di Costanzo, A., &amp;amp; Buyya, R. (2009). Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters. Paper presented at the HPDC '09: Proceedings of the 18th ACM International Symposium on High Performance Distributed Computing, Garching, Germany. 141-150. Retrieved from http://doi.acm.org.library.capella.edu/10.1145/1551609.1551635 &lt;br /&gt;
&lt;br /&gt;
Hoover, J. (2009, April). GE Puts The Cloud Model To The Test. InformationWeek,(1226), 32-33.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1682898981). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Service_and_Data_Integration&amp;diff=75412</id>
		<title>Cloud-10 Service and Data Integration</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Service_and_Data_Integration&amp;diff=75412"/>
				<updated>2009-12-22T21:27:15Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* R6: Service and Data Integration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==R6: Service and Data Integration ==&lt;br /&gt;
&lt;br /&gt;
Companies that are planning to adopt cloud must make sure that their proprietary data is adequately protected as it traverses through the internet between the end user and the cloud data center(s). Cloud computing models increase the risks associated with interception of data in transit, eventhough these risks are not unique to cloud. Cloud providers must ensure that they use SSL and/or tighter encryption protocols to secure data in transit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
Babcock, C. (2009, September). Hybrid Clouds. InformationWeek,(1240), 15-19.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1865633581). &lt;br /&gt;
Byrne, T. (2009, April). Clouding Over. EContent, 32(3), 37.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1675328451). &lt;br /&gt;
de Assuncao, M. D., di Costanzo, A., &amp;amp; Buyya, R. (2009). Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters. Paper presented at the HPDC '09: Proceedings of the 18th ACM International Symposium on High Performance Distributed Computing, Garching, Germany. 141-150. Retrieved from http://doi.acm.org.library.capella.edu/10.1145/1551609.1551635 &lt;br /&gt;
Hoover, J. (2009, April). GE Puts The Cloud Model To The Test. InformationWeek,(1226), 32-33.  Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1682898981). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Regulatory_Compliance&amp;diff=75411</id>
		<title>Cloud-10 Regulatory Compliance</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Regulatory_Compliance&amp;diff=75411"/>
				<updated>2009-12-22T21:10:49Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* R3: Regulatory Compliance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==R3: Regulatory Compliance ==&lt;br /&gt;
&lt;br /&gt;
Customers are ultimately responsible for the security and compliance with regulatory laws (e.g., SOX, HIPAA etc) of their own applications that are hosted in cloud. Data stewards and application owners must plan to put timely audits in place to ensure proper controls in the applications and infrastructure that is hosted at a cloud provider. Companies that are planning to adopt cloud (SaaS, Iaas, Paas etc) must ensure that their cloud provider understand the respective roles and responsbilities (RACI etc) in helping out customers in maintaining required compliance with the appropriate regulatory laws and standards (government and commercial). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References: &lt;br /&gt;
&lt;br /&gt;
Anthes, G.. (2009, January). SaaS Realities. Computerworld, 43(1), 21-22. Retrieved August 9, 2009, from ABI/INFORM Global. (Document ID: 1626575741). &lt;br /&gt;
&lt;br /&gt;
Business: Pain in the aaS; Computer security. (2008, April). The Economist, 387(8577), 86. Retrieved August 9, 2009, from ABI/INFORM Global. (Document ID: 1469385981). &lt;br /&gt;
&lt;br /&gt;
Gartner: Seven Cloud-Computing Security Risks. http://www.cio.com/article/423713/Gartner_Seven_Cloud_Computing_Security_Risks?page=1&amp;amp;taxonomyId=1419 &lt;br /&gt;
&lt;br /&gt;
Google: Cloud computing more secure than traditional IT. http://www.computerweekly.com/Articles/2009/07/21/236982/cloud-computing-more-secure-than-traditional-it-says.htm &lt;br /&gt;
&lt;br /&gt;
Top five cloud computing security issues. http://www.computerweekly.com/Articles/2009/04/24/235782/top-five-cloud-computing-security-issues.htm &lt;br /&gt;
&lt;br /&gt;
Cloud Security Alliance. http://www.cloudsecurityalliance.org/csaguide.pdf &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=74383</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=74383"/>
				<updated>2009-11-30T01:54:49Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* Initial pre-alpha list of OWASP Cloud Top 10 Security Risks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
Goal of the project is to maintain a list of top 10 security risks faced with the Cloud Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list. &lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== OWASP Cloud-10 List  ====&lt;br /&gt;
&lt;br /&gt;
== Initial pre-alpha list of OWASP Cloud Top 10 Security Risks  ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Accountability_and_Data_Ownership R1 - Accountability and Data Ownership]&lt;br /&gt;
| Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Identity_Federation R2 - User Identity Federation]&lt;br /&gt;
| It is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides.   (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Regulatory_Compliance R3 - Regulatory Compliance]&lt;br /&gt;
|  - Complex to Demonstrate regulatory compliance. Data that is perceived to be secure in one country may not be perceived secure in another due to different regulatory laws across countries or regions. For eg., European Union has very strict privacy laws and hence data stored in US may not comply with those EU laws. (Shankar)&lt;br /&gt;
|-&lt;br /&gt;
| R4 - Business Continuity and Resiliency &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Privacy_and_Secondary_Usage_of_Data R5 - User Privacy and Secondary Usage of Data]&lt;br /&gt;
|  User's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users  (Vinay) - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination.  (Vinay)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Service_and_Data_Integration R6 - Service and Data Integration] &lt;br /&gt;
| Organizations must be sure that their proprietary data is adequately protected as it is transferred between the end user and the cloud data center. While interception of data in transit should be of concern to every organization, the risk is much greater for organizations utilizing a cloud computing model, where data is transmitted over the Internet. Unsecured data is susceptible to interception and compromise during transmission. (Shankar)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Multi_Tenancy_and_Physical_Security R7 - Multi Tenancy and Physical Security] &lt;br /&gt;
| Vinay&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Incidence_Analysis_and_Forensic_Support R8 - Incidence Analysis and Forensic Support]&lt;br /&gt;
|In the event of a security incident, applications and services hosted at a cloud provider are difficult to investigate as logging may be distributed across multiple hosts and data centers which could be located in various countries and hence governed by different laws. Also, along with log files, data belonging to multiple customers may be co-mingled on the same storage devices and hence a concern for law enforcing agencies for forensic recovery.  (Shankar)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Infrastructure_Security R9 - Infrastructure Security]&lt;br /&gt;
| -Vinay&lt;br /&gt;
|-&lt;br /&gt;
| R10 - Non Production Environment Exposure &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Cloud - Security Risks&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Cloud-10 Candidates  ==&lt;br /&gt;
&lt;br /&gt;
* exposure to non-prod and internal environments &lt;br /&gt;
*Integration between cloud and internally hosted services &lt;br /&gt;
*Patching and Vulnerability Management &lt;br /&gt;
*Lack of Transparency in Internal Security Controls and difficulty/complexity of auditing &lt;br /&gt;
*Enterprise Intranets exposed directly on Internet (if they move on a Public Cloud)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This needs to be debated and for each of these we may need to add a separate page-holder with the following details. &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigation and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Alpha State  ==&lt;br /&gt;
&lt;br /&gt;
Approach:&lt;br /&gt;
&lt;br /&gt;
Criteria:&lt;br /&gt;
a) Easily Executable&lt;br /&gt;
b) Most Damaging&lt;br /&gt;
c) Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
Top 10&lt;br /&gt;
&lt;br /&gt;
Normalize Verbiage&lt;br /&gt;
Describe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (July 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Aug 2009) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (till Aug-Sept 2009)&lt;br /&gt;
&lt;br /&gt;
== Beta State  ==&lt;br /&gt;
&lt;br /&gt;
#Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (Oct 2009) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Taxonomy  ====&lt;br /&gt;
&lt;br /&gt;
== Terms ==&lt;br /&gt;
&lt;br /&gt;
== Diagrams ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Shankar Babu Chebrolu]]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Pankaj Telang|Pankaj Telang]]&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang]&lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=74382</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=74382"/>
				<updated>2009-11-30T01:53:19Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* Initial pre-alpha list of OWASP Cloud Top 10 Security Risks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
Goal of the project is to maintain a list of top 10 security risks faced with the Cloud Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list. &lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== OWASP Cloud-10 List  ====&lt;br /&gt;
&lt;br /&gt;
== Initial pre-alpha list of OWASP Cloud Top 10 Security Risks  ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Accountability_and_Data_Ownership R1 - Accountability and Data Ownership]&lt;br /&gt;
| Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Identity_Federation R2 - User Identity Federation]&lt;br /&gt;
| It is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides.   (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Regulatory_Compliance R3 - Regulatory Compliance]&lt;br /&gt;
|  - Complex to Demonstrate regulatory compliance. Data that is perceived to be secure in one country may not be perceived secure in another due to different regulatory laws across countries or regions. For eg., European Union has very strict privacy laws and hence data stored in US may not comply with those EU laws. (Shankar)&lt;br /&gt;
|-&lt;br /&gt;
| R4 - Business Continuity and Resiliency &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Privacy_and_Secondary_Usage_of_Data R5 - User Privacy and Secondary Usage of Data]&lt;br /&gt;
|  User's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users  (Vinay) - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination.  (Vinay)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Service_and_Data_Integration R6 - Service and Data Integration] Organizations must be sure that their proprietary data is adequately protected as it is transferred between the end user and the cloud data center. While interception of data in transit should be of concern to every organization, the risk is much greater for organizations utilizing a cloud computing model, where data is transmitted over the Internet. Unsecured data is susceptible to interception and compromise during transmission. (Shankar)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Multi_Tenancy_and_Physical_Security R7 - Multi Tenancy and Physical Security] &lt;br /&gt;
| Vinay&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Incidence_Analysis_and_Forensic_Support R8 - Incidence Analysis and Forensic Support]&lt;br /&gt;
|In the event of a security incident, applications and services hosted at a cloud provider are difficult to investigate as logging may be distributed across multiple hosts and data centers which could be located in various countries and hence governed by different laws. Also, along with log files, data belonging to multiple customers may be co-mingled on the same storage devices and hence a concern for law enforcing agencies for forensic recovery.  (Shankar)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Infrastructure_Security R9 - Infrastructure Security]&lt;br /&gt;
| -Vinay&lt;br /&gt;
|-&lt;br /&gt;
| R10 - Non Production Environment Exposure &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Cloud - Security Risks&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Cloud-10 Candidates  ==&lt;br /&gt;
&lt;br /&gt;
* exposure to non-prod and internal environments &lt;br /&gt;
*Integration between cloud and internally hosted services &lt;br /&gt;
*Patching and Vulnerability Management &lt;br /&gt;
*Lack of Transparency in Internal Security Controls and difficulty/complexity of auditing &lt;br /&gt;
*Enterprise Intranets exposed directly on Internet (if they move on a Public Cloud)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This needs to be debated and for each of these we may need to add a separate page-holder with the following details. &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigation and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Alpha State  ==&lt;br /&gt;
&lt;br /&gt;
Approach:&lt;br /&gt;
&lt;br /&gt;
Criteria:&lt;br /&gt;
a) Easily Executable&lt;br /&gt;
b) Most Damaging&lt;br /&gt;
c) Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
Top 10&lt;br /&gt;
&lt;br /&gt;
Normalize Verbiage&lt;br /&gt;
Describe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (July 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Aug 2009) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (till Aug-Sept 2009)&lt;br /&gt;
&lt;br /&gt;
== Beta State  ==&lt;br /&gt;
&lt;br /&gt;
#Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (Oct 2009) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Taxonomy  ====&lt;br /&gt;
&lt;br /&gt;
== Terms ==&lt;br /&gt;
&lt;br /&gt;
== Diagrams ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Shankar Babu Chebrolu]]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Pankaj Telang|Pankaj Telang]]&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang]&lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=74300</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=74300"/>
				<updated>2009-11-28T21:32:28Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* Initial pre-alpha list of OWASP Cloud Top 10 Security Risks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
Goal of the project is to maintain a list of top 10 security risks faced with the Cloud Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list. &lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== OWASP Cloud-10 List  ====&lt;br /&gt;
&lt;br /&gt;
== Initial pre-alpha list of OWASP Cloud Top 10 Security Risks  ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Accountability_and_Data_Ownership R1 - Accountability and Data Ownership]&lt;br /&gt;
| Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Identity_Federation R2 - User Identity Federation]&lt;br /&gt;
| It is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides.   (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Regulatory_Compliance R3 - Regulatory Compliance]&lt;br /&gt;
|  - Complex to Demonstrate regulatory compliance. Data that is perceived to be secure in one country may not be perceived secure in another due to different regulatory laws across countries or regions. For eg., European Union has very strict privacy laws and hence data stored in US may not comply with those EU laws. (Shankar)&lt;br /&gt;
|-&lt;br /&gt;
| R4 - Business Continuity and Resiliency &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Privacy_and_Secondary_Usage_of_Data R5 - User Privacy and Secondary Usage of Data]&lt;br /&gt;
|  User's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users  (Vinay) - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination.  (Vinay)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Service_and_Data_Integration R6 - Service and Data Integration] &lt;br /&gt;
| Shankar&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Multi_Tenancy_and_Physical_Security R7 - Multi Tenancy and Physical Security] &lt;br /&gt;
| Vinay&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Incidence_Analysis_and_Forensic_Support R8 - Incidence Analysis and Forensic Support]&lt;br /&gt;
|In the event of a security incident, applications and services hosted at a cloud provider are difficult to investigate as logging may be distributed across multiple hosts and data centers which could be located in various countries and hence governed by different laws. Also, along with log files, data belonging to multiple customers may be co-mingled on the same storage devices and hence a concern for law enforcing agencies for forensic recovery.  (Shankar)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Infrastructure_Security R9 - Infrastructure Security]&lt;br /&gt;
| -Vinay&lt;br /&gt;
|-&lt;br /&gt;
| R10 - Non Production Environment Exposure &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Cloud - Security Risks&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Cloud-10 Candidates  ==&lt;br /&gt;
&lt;br /&gt;
* exposure to non-prod and internal environments &lt;br /&gt;
*Integration between cloud and internally hosted services &lt;br /&gt;
*Patching and Vulnerability Management &lt;br /&gt;
*Lack of Transparency in Internal Security Controls and difficulty/complexity of auditing &lt;br /&gt;
*Enterprise Intranets exposed directly on Internet (if they move on a Public Cloud)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This needs to be debated and for each of these we may need to add a separate page-holder with the following details. &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigation and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Alpha State  ==&lt;br /&gt;
&lt;br /&gt;
Approach:&lt;br /&gt;
&lt;br /&gt;
Criteria:&lt;br /&gt;
a) Easily Executable&lt;br /&gt;
b) Most Damaging&lt;br /&gt;
c) Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
Top 10&lt;br /&gt;
&lt;br /&gt;
Normalize Verbiage&lt;br /&gt;
Describe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (July 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Aug 2009) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (till Aug-Sept 2009)&lt;br /&gt;
&lt;br /&gt;
== Beta State  ==&lt;br /&gt;
&lt;br /&gt;
#Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (Oct 2009) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Taxonomy  ====&lt;br /&gt;
&lt;br /&gt;
== Terms ==&lt;br /&gt;
&lt;br /&gt;
== Diagrams ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Shankar Babu Chebrolu]]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Pankaj Telang|Pankaj Telang]]&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang]&lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=74299</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=74299"/>
				<updated>2009-11-28T21:21:26Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* Initial pre-alpha list of OWASP Cloud Top 10 Security Risks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
Goal of the project is to maintain a list of top 10 security risks faced with the Cloud Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list. &lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== OWASP Cloud-10 List  ====&lt;br /&gt;
&lt;br /&gt;
== Initial pre-alpha list of OWASP Cloud Top 10 Security Risks  ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Accountability_and_Data_Ownership R1 - Accountability and Data Ownership]&lt;br /&gt;
| Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Identity_Federation R2 - User Identity Federation]&lt;br /&gt;
| It is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides.   (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Regulatory_Compliance R3 - Regulatory Compliance]&lt;br /&gt;
|  - Complex to Demonstrate regulatory compliance. Data that is perceived to be secure in one country may not be perceived secure in another due to different regulatory laws across countries or regions. For eg., European Union has very strict privacy laws and hence data stored in US may not comply with those EU laws. (Shankar)&lt;br /&gt;
|-&lt;br /&gt;
| R4 - Business Continuity and Resiliency &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Privacy_and_Secondary_Usage_of_Data R5 - User Privacy and Secondary Usage of Data]&lt;br /&gt;
|  User's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users  (Vinay) - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination.  (Vinay)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Service_and_Data_Integration R6 - Service and Data Integration] &lt;br /&gt;
| Shankar&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Multi_Tenancy_and_Physical_Security R7 - Multi Tenancy and Physical Security] &lt;br /&gt;
| Vinay&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Incidence_Analysis_and_Forensic_Support R8 - Incidence Analysis and Forensic Support]&lt;br /&gt;
|In the event of a security incident, applications and services hosted at a cloud provider are difficult to investigate as logging may be distributed across multiple hosts and data centers which could be located in various countries and hence governed by different laws. Also, along with log files, data belonging to multiple customers may be co-mingled on the same storage devices and hence a concern for law enforcing agencies for forensic recovery.&lt;br /&gt;
|  Shankar&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Infrastructure_Security R9 - Infrastructure Security]&lt;br /&gt;
| -Vinay&lt;br /&gt;
|-&lt;br /&gt;
| R10 - Non Production Environment Exposure &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Cloud - Security Risks&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Cloud-10 Candidates  ==&lt;br /&gt;
&lt;br /&gt;
* exposure to non-prod and internal environments &lt;br /&gt;
*Integration between cloud and internally hosted services &lt;br /&gt;
*Patching and Vulnerability Management &lt;br /&gt;
*Lack of Transparency in Internal Security Controls and difficulty/complexity of auditing &lt;br /&gt;
*Enterprise Intranets exposed directly on Internet (if they move on a Public Cloud)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This needs to be debated and for each of these we may need to add a separate page-holder with the following details. &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigation and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Alpha State  ==&lt;br /&gt;
&lt;br /&gt;
Approach:&lt;br /&gt;
&lt;br /&gt;
Criteria:&lt;br /&gt;
a) Easily Executable&lt;br /&gt;
b) Most Damaging&lt;br /&gt;
c) Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
Top 10&lt;br /&gt;
&lt;br /&gt;
Normalize Verbiage&lt;br /&gt;
Describe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (July 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Aug 2009) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (till Aug-Sept 2009)&lt;br /&gt;
&lt;br /&gt;
== Beta State  ==&lt;br /&gt;
&lt;br /&gt;
#Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (Oct 2009) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Taxonomy  ====&lt;br /&gt;
&lt;br /&gt;
== Terms ==&lt;br /&gt;
&lt;br /&gt;
== Diagrams ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Shankar Babu Chebrolu]]&lt;br /&gt;
&amp;lt;br&amp;gt;[[User:Pankaj Telang|Pankaj Telang]]&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang]&lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Shankar_Babu_Chebrolu&amp;diff=73441</id>
		<title>User:Shankar Babu Chebrolu</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Shankar_Babu_Chebrolu&amp;diff=73441"/>
				<updated>2009-11-16T15:08:01Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Shankar Babu Chebrolu,CISSP is an IT Security Architect responsible for securing web based applications in Customer Value Chain Management at Cisco Systems, working closely with Cisco Supply Chain partners, Application Service Providers, Solution Vendors and Corporate Security Programs Organization (CSPO). He has worked at Cisco for about 9 years. Shankar Babu Chebrolu has been a speaker at conferences including Siebel Customer World, Oracle Open World, Oracle Applications User Group, CA World, Triangle InfoseCon, ISSA-Raleigh presenting in his areas of expertise: securing web applications and integrating third party security models within Cisco Enterprise. Shankar holds a Master's Degree in Computer Science from Indian Institute of Technology (IIT), Mumbai, India.&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Shankar_Babu_Chebrolu&amp;diff=73440</id>
		<title>User:Shankar Babu Chebrolu</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Shankar_Babu_Chebrolu&amp;diff=73440"/>
				<updated>2009-11-16T15:07:21Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Shankar Babu Chebrolu,CISSP is an IT Security Architect responsible for securing web based applications in Customer Value Chain Management at Cisco Systems, working closely with Cisco Supply Chain partners, Application Service Providers, Solution Vendors and Corporate Security Programs Organization (CSPO). He has worked at Cisco for about 9 years. Shankar Babu Chebrolu has been a speaker at conferences including Siebel Customer World, Oracle Open World, Oracle Applications User Group, CA World, Triangle InfoseCon, ISSA presenting in his areas of expertise: securing web applications and integrating third party security models within Cisco Enterprise. Shankar holds a Master's Degree in Computer Science from Indian Institute of Technology (IIT), Mumbai, India.&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Regulatory_Compliance&amp;diff=73437</id>
		<title>Cloud-10 Regulatory Compliance</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Regulatory_Compliance&amp;diff=73437"/>
				<updated>2009-11-16T14:39:23Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: Created page with '==R3: Regulatory Compliance ==            Category:OWASP Cloud ‐ 10 Project  __NOTOC__ &amp;lt;headertabs/&amp;gt;'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==R3: Regulatory Compliance ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=73436</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=73436"/>
				<updated>2009-11-16T14:38:19Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* Initial pre-alpha list of OWASP Cloud Top 10 Security Risks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
Goal of the project is to maintain a list of top 10 security risks faced with the Cloud Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list. &lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== OWASP Cloud-10 List  ====&lt;br /&gt;
&lt;br /&gt;
== Initial pre-alpha list of OWASP Cloud Top 10 Security Risks  ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Accountability_and_Data_Ownership R1 - Accountability and Data Ownership]&lt;br /&gt;
| Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Identity_Federation R2 - User Identity Federation]&lt;br /&gt;
| It is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides.   (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Regulatory_Compliance R3 - Regulatory Compliance]&lt;br /&gt;
|  - Complex to Demonstrate regulatory compliance. Data that is perceived to be secure in one country may not be perceived secure in another due to different regulatory laws across countries or regions. For eg., European Union has very strict privacy laws and hence data stored in US may not comply with those EU laws. (Shankar)&lt;br /&gt;
|-&lt;br /&gt;
| R4 - Business Continuity and Resiliency &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Privacy_and_Secondary_Usage_of_Data R5 - User Privacy and Secondary Usage of Data]&lt;br /&gt;
|  User's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users  (Vinay) - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination.  (Vinay)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Service_and_Data_Integration R6 - Service and Data Integration]&lt;br /&gt;
| Shankar&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Multi_Tenancy_and_Physical_Security R7 - Multi Tenancy and Physical Security] &lt;br /&gt;
| Vinay&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Incidence_Analysis_and_Forensic_Support R8 - Incidence Analysis and Forensic Support]&lt;br /&gt;
|  Shankar&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Infrastructure_Security R9 - Infrastructure Security]&lt;br /&gt;
| -Vinay&lt;br /&gt;
|-&lt;br /&gt;
| R10 - Non Production Environment Exposure &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Cloud - Security Risks&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Cloud-10 Candidates  ==&lt;br /&gt;
&lt;br /&gt;
* exposure to non-prod and internal environments &lt;br /&gt;
*Integration between cloud and internally hosted services &lt;br /&gt;
*Patching and Vulnerability Management &lt;br /&gt;
*Lack of Transparency in Internal Security Controls and difficulty/complexity of auditing &lt;br /&gt;
*Enterprise Intranets exposed directly on Internet (if they move on a Public Cloud)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This needs to be debated and for each of these we may need to add a separate page-holder with the following details. &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigation and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Alpha State  ==&lt;br /&gt;
&lt;br /&gt;
Approach:&lt;br /&gt;
&lt;br /&gt;
Criteria:&lt;br /&gt;
a) Easily Executable&lt;br /&gt;
b) Most Damaging&lt;br /&gt;
c) Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
Top 10&lt;br /&gt;
&lt;br /&gt;
Normalize Verbiage&lt;br /&gt;
Describe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (July 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Aug 2009) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (till Aug-Sept 2009)&lt;br /&gt;
&lt;br /&gt;
== Beta State  ==&lt;br /&gt;
&lt;br /&gt;
#Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (Oct 2009) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Taxonomy  ====&lt;br /&gt;
&lt;br /&gt;
== Terms ==&lt;br /&gt;
&lt;br /&gt;
== Diagrams ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Shankar Babu Chebrolu]]&amp;lt;br&amp;gt; [[User:Martin G. Nystrom|Martin G. Nystrom]]&amp;lt;br&amp;gt; [[User:Jim Born|Jim Born]] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang] &lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Incidence_Analysis_and_Forensic_Support&amp;diff=73435</id>
		<title>Cloud-10 Incidence Analysis and Forensic Support</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Incidence_Analysis_and_Forensic_Support&amp;diff=73435"/>
				<updated>2009-11-16T14:19:40Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: Created page with '==R8: Incidence Analysis and Forensic Support ==            Category:OWASP Cloud ‐ 10 Project  __NOTOC__ &amp;lt;headertabs/&amp;gt;'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==R8: Incidence Analysis and Forensic Support ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Service_and_Data_Integration&amp;diff=73434</id>
		<title>Cloud-10 Service and Data Integration</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Service_and_Data_Integration&amp;diff=73434"/>
				<updated>2009-11-16T14:18:24Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: Created page with '==R6: Service and Data Integration ==            Category:OWASP Cloud ‐ 10 Project  __NOTOC__ &amp;lt;headertabs/&amp;gt;'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==R6: Service and Data Integration ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=73432</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=73432"/>
				<updated>2009-11-16T14:15:33Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* Initial pre-alpha list of OWASP Cloud Top 10 Security Risks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
Goal of the project is to maintain a list of top 10 security risks faced with the Cloud Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list. &lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== OWASP Cloud-10 List  ====&lt;br /&gt;
&lt;br /&gt;
== Initial pre-alpha list of OWASP Cloud Top 10 Security Risks  ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Accountability_and_Data_Ownership R1 - Accountability and Data Ownership]&lt;br /&gt;
| Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Identity_Federation R2 - User Identity Federation]&lt;br /&gt;
| It is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides.   (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| R3 - Regulatory Compliance &lt;br /&gt;
|  - Complex to Demonstrate regulatory compliance. Data that is perceived to be secure in one country may not be perceived secure in another due to different regulatory laws across countries or regions. For eg., European Union has very strict privacy laws and hence data stored in US may not comply with those EU laws. (Shankar)&lt;br /&gt;
|-&lt;br /&gt;
| R4 - Business Continuity and Resiliency &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_User_Privacy_and_Secondary_Usage_of_Data R5 - User Privacy and Secondary Usage of Data]&lt;br /&gt;
|  User's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users  (Vinay) - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination.  (Vinay)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Service_and_Data_Integration R6 - Service and Data Integration]&lt;br /&gt;
| Shankar&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Multi_Tenancy_and_Physical_Security R7 - Multi Tenancy and Physical Security] &lt;br /&gt;
| Vinay&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Incidence_Analysis_and_Forensic_Support R8 - Incidence Analysis and Forensic Support]&lt;br /&gt;
|  Shankar&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Cloud-10_Infrastructure_Security R9 - Infrastructure Security]&lt;br /&gt;
| -Vinay&lt;br /&gt;
|-&lt;br /&gt;
| R10 - Non Production Environment Exposure &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Cloud - Security Risks&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Cloud-10 Candidates  ==&lt;br /&gt;
&lt;br /&gt;
* exposure to non-prod and internal environments &lt;br /&gt;
*Integration between cloud and internally hosted services &lt;br /&gt;
*Patching and Vulnerability Management &lt;br /&gt;
*Lack of Transparency in Internal Security Controls and difficulty/complexity of auditing &lt;br /&gt;
*Enterprise Intranets exposed directly on Internet (if they move on a Public Cloud)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This needs to be debated and for each of these we may need to add a separate page-holder with the following details. &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigation and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Alpha State  ==&lt;br /&gt;
&lt;br /&gt;
Approach:&lt;br /&gt;
&lt;br /&gt;
Criteria:&lt;br /&gt;
a) Easily Executable&lt;br /&gt;
b) Most Damaging&lt;br /&gt;
c) Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
Top 10&lt;br /&gt;
&lt;br /&gt;
Normalize Verbiage&lt;br /&gt;
Describe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (July 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Aug 2009) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (till Aug-Sept 2009)&lt;br /&gt;
&lt;br /&gt;
== Beta State  ==&lt;br /&gt;
&lt;br /&gt;
#Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (Oct 2009) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Taxonomy  ====&lt;br /&gt;
&lt;br /&gt;
== Terms ==&lt;br /&gt;
&lt;br /&gt;
== Diagrams ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Shankar Babu Chebrolu]]&amp;lt;br&amp;gt; [[User:Martin G. Nystrom|Martin G. Nystrom]]&amp;lt;br&amp;gt; [[User:Jim Born|Jim Born]] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang] &lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=72864</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=72864"/>
				<updated>2009-11-09T14:48:05Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* Initial pre-alpha list of OWASP Cloud Top 10 Security Risks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
Goal of the project is to maintain a list of top 10 security risks faced with the Cloud Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list. &lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== OWASP Cloud-10 List  ====&lt;br /&gt;
&lt;br /&gt;
== Initial pre-alpha list of OWASP Cloud Top 10 Security Risks  ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| R1 - Accountability and Data Ownership in Cloud &lt;br /&gt;
| Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| R2 - Federating User Identity &lt;br /&gt;
| It is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides.   (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| R3 - Privacy of Users &lt;br /&gt;
|  User's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users  (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| R4 - Secure service integration among cloud providers and consumers &lt;br /&gt;
| Shankar&lt;br /&gt;
|-&lt;br /&gt;
| R5 - Secondary Usage of Data by Cloud Providers&lt;br /&gt;
|  - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination.  (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| R6 - Complex to Demonstrate Regulatory Compliance &lt;br /&gt;
|  - Data that is perceived to be secure in one country may not be perceived secure in another due to different regulatory laws across countries or regions. For eg., European Union has very strict privacy laws and hence data stored in US may not comply with those EU laws. (Shankar)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| R7 - Risk of Not having Right Level of Insurance and Accountability in SLAs (Control ?? - Service Availability Risk)&lt;br /&gt;
|  - Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| R8 - Incident analysis and forensic support&lt;br /&gt;
| - Shankar&lt;br /&gt;
|-&lt;br /&gt;
| R9 - Business Continuity and Resiliency &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| R10 - Controlling exposure to non-prod and internal environments &lt;br /&gt;
| - Vinay&lt;br /&gt;
|- &lt;br /&gt;
| R11 - Multi Tenancy and Physical Security&lt;br /&gt;
| - Shankar&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Cloud - Security Risks&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Cloud-10 Candidates  ==&lt;br /&gt;
&lt;br /&gt;
*Service Availability Risk &lt;br /&gt;
*Multi-Tenancy &lt;br /&gt;
*Integration between cloud and internally hosted services &lt;br /&gt;
*Patching and Vulnerability Management &lt;br /&gt;
*Lack of Transparency in Internal Security Controls and difficulty/complexity of auditing &lt;br /&gt;
*Enterprise Intranets exposed directly on Internet (if they move on a Public Cloud)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This needs to be debated and for each of these we may need to add a separate page-holder with the following details. &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigation and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Alpha State  ==&lt;br /&gt;
&lt;br /&gt;
Approach:&lt;br /&gt;
&lt;br /&gt;
Criteria:&lt;br /&gt;
a) Easily Executable&lt;br /&gt;
b) Most Damaging&lt;br /&gt;
c) Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
Top 10&lt;br /&gt;
&lt;br /&gt;
Normalize Verbiage&lt;br /&gt;
Describe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (July 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Aug 2009) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (till Aug-Sept 2009)&lt;br /&gt;
&lt;br /&gt;
== Beta State  ==&lt;br /&gt;
&lt;br /&gt;
#Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (Oct 2009) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Shankar Babu Chebrolu]]&amp;lt;br&amp;gt; [[User:Martin G. Nystrom|Martin G. Nystrom]]&amp;lt;br&amp;gt; [[User:Jim Born|Jim Born]] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang] &lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=72863</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=72863"/>
				<updated>2009-11-09T14:39:22Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* Initial pre-alpha list of OWASP Cloud Top 10 Security Risks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
Goal of the project is to maintain a list of top 10 security risks faced with the Cloud Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list. &lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== OWASP Cloud-10 List  ====&lt;br /&gt;
&lt;br /&gt;
== Initial pre-alpha list of OWASP Cloud Top 10 Security Risks  ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| R1 - Accountability and Data Ownership in Cloud &lt;br /&gt;
| Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| R2 - Federating User Identity &lt;br /&gt;
| It is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides.   (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| R3 - Privacy of Users &lt;br /&gt;
|  User's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users  (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| R4 - Secure service integration among cloud providers and consumers &lt;br /&gt;
| Shankar&lt;br /&gt;
|-&lt;br /&gt;
| R5 - Secondary Usage of Data by Cloud Providers&lt;br /&gt;
|  - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination.  (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| R6 - Complex to Demonstrate Regulatory Compliance &lt;br /&gt;
|  - Data that is perceived to be secure in one country may not be perceived secure in another due to different regulatory laws across countries or regions. For eg., Europen Union has very strict privacy laws. (Shankar)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| R7 - Risk of Not having Right Level of Insurance and Accountability in SLAs (Control ?? - Service Availability Risk)&lt;br /&gt;
|  - Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| R8 - Incident analysis and forensic support&lt;br /&gt;
| - Shankar&lt;br /&gt;
|-&lt;br /&gt;
| R9 - Business Continuity and Resiliency &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| R10 - Controlling exposure to non-prod and internal environments &lt;br /&gt;
| - Vinay&lt;br /&gt;
|- &lt;br /&gt;
| R11 - Multi Tenancy and Physical Security&lt;br /&gt;
| - Shankar&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Cloud - Security Risks&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Cloud-10 Candidates  ==&lt;br /&gt;
&lt;br /&gt;
*Service Availability Risk &lt;br /&gt;
*Multi-Tenancy &lt;br /&gt;
*Integration between cloud and internally hosted services &lt;br /&gt;
*Patching and Vulnerability Management &lt;br /&gt;
*Lack of Transparency in Internal Security Controls and difficulty/complexity of auditing &lt;br /&gt;
*Enterprise Intranets exposed directly on Internet (if they move on a Public Cloud)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This needs to be debated and for each of these we may need to add a separate page-holder with the following details. &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigation and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Alpha State  ==&lt;br /&gt;
&lt;br /&gt;
Approach:&lt;br /&gt;
&lt;br /&gt;
Criteria:&lt;br /&gt;
a) Easily Executable&lt;br /&gt;
b) Most Damaging&lt;br /&gt;
c) Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
Top 10&lt;br /&gt;
&lt;br /&gt;
Normalize Verbiage&lt;br /&gt;
Describe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (July 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Aug 2009) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (till Aug-Sept 2009)&lt;br /&gt;
&lt;br /&gt;
== Beta State  ==&lt;br /&gt;
&lt;br /&gt;
#Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (Oct 2009) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Shankar Babu Chebrolu]]&amp;lt;br&amp;gt; [[User:Martin G. Nystrom|Martin G. Nystrom]]&amp;lt;br&amp;gt; [[User:Jim Born|Jim Born]] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang] &lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=72862</id>
		<title>Category:OWASP Cloud ‐ 10 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Cloud_%E2%80%90_10_Project&amp;diff=72862"/>
				<updated>2009-11-09T14:33:36Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: /* Initial pre-alpha list of OWASP Cloud Top 10 Security Risks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Cloud Top 10 Security Risks ==&lt;br /&gt;
&lt;br /&gt;
== Goal  ==&lt;br /&gt;
&lt;br /&gt;
Goal of the project is to maintain a list of top 10 security risks faced with the Cloud Computing and SaaS Models. List will be maintained by input from community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
== Audience  ==&lt;br /&gt;
&lt;br /&gt;
Audience for the project will be organizations planning on leveraging external cloud environment to host their applications or rent application in a SaaS model (Software as a Service). Aim of the &amp;quot;OWASP Cloud-10&amp;quot; list is to help balance security risks with the cost advantage that the Cloud and SaaS model provides. We expect the Cloud and SaaS providers to be indirect audience for &amp;quot;OWASP Cloud-10&amp;quot;, when they try to showcase their security controls to potential customers against this list. &lt;br /&gt;
&lt;br /&gt;
== Managing OWASP Cloud-10 List (Pre-Alpha)  ==&lt;br /&gt;
&lt;br /&gt;
“OWASP Cloud-10” list will be maintained by input from, community, security experts and security incidences at cloud/SaaS providers. &lt;br /&gt;
&lt;br /&gt;
Each of the identified risk in &amp;quot;OWASP Cloud-10&amp;quot; will provide details on: &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigations and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== OWASP Cloud-10 List  ====&lt;br /&gt;
&lt;br /&gt;
== Initial pre-alpha list of OWASP Cloud Top 10 Security Risks  ==&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| R1 - Accountability and Data Ownership in Cloud &lt;br /&gt;
| Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| R2 - Federating User Identity &lt;br /&gt;
| It is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides.   (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| R3 - Privacy of Users &lt;br /&gt;
|  User's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users  (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| R4 - Secure service integration among cloud providers and consumers &lt;br /&gt;
| Shankar&lt;br /&gt;
|-&lt;br /&gt;
| R5 - Secondary Usage of Data by Cloud Providers&lt;br /&gt;
|  - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination.  (Vinay)&lt;br /&gt;
|-&lt;br /&gt;
| R6 - Complex to Demonstrate Regulatory Compliance &lt;br /&gt;
|  - Data that is perceived to be secure in one country may not be perceived secure in another country or region. For eg., Europen Union has very strict privacy laws. (Shankar)&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| R7 - Risk of Not having Right Level of Insurance and Accountability in SLAs (Control ?? - Service Availability Risk)&lt;br /&gt;
|  - Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| R8 - Incident analysis and forensic support&lt;br /&gt;
| - Shankar&lt;br /&gt;
|-&lt;br /&gt;
| R9 - Business Continuity and Resiliency &lt;br /&gt;
| - Pankaj&lt;br /&gt;
|-&lt;br /&gt;
| R10 - Controlling exposure to non-prod and internal environments &lt;br /&gt;
| - Vinay&lt;br /&gt;
|- &lt;br /&gt;
| R11 - Multi Tenancy and Physical Security&lt;br /&gt;
| - Shankar&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Cloud - Security Risks&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Cloud-10 Candidates  ==&lt;br /&gt;
&lt;br /&gt;
*Service Availability Risk &lt;br /&gt;
*Multi-Tenancy &lt;br /&gt;
*Integration between cloud and internally hosted services &lt;br /&gt;
*Patching and Vulnerability Management &lt;br /&gt;
*Lack of Transparency in Internal Security Controls and difficulty/complexity of auditing &lt;br /&gt;
*Enterprise Intranets exposed directly on Internet (if they move on a Public Cloud)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This needs to be debated and for each of these we may need to add a separate page-holder with the following details. &lt;br /&gt;
&lt;br /&gt;
*Various Risk Scenarios &lt;br /&gt;
*Real World Examples &lt;br /&gt;
*Possible Mitigation and Security Controls &lt;br /&gt;
*Reference to any related Incident&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap (Status)  ====&lt;br /&gt;
&lt;br /&gt;
== Alpha State  ==&lt;br /&gt;
&lt;br /&gt;
Approach:&lt;br /&gt;
&lt;br /&gt;
Criteria:&lt;br /&gt;
a) Easily Executable&lt;br /&gt;
b) Most Damaging&lt;br /&gt;
c) Incidence Frequency (Known)&lt;br /&gt;
&lt;br /&gt;
Top 10&lt;br /&gt;
&lt;br /&gt;
Normalize Verbiage&lt;br /&gt;
Describe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#'''Identify and publish a first draft of potential &amp;quot;OWASP Cloud-10&amp;quot; candidates (July 2009)''' &lt;br /&gt;
#Ask contributors to collect more data and details on each of the risk item. (till Aug 2009) &lt;br /&gt;
#Get initial community feedback by discussing it in various blogs, discussion forums etc. (till Aug-Sept 2009)&lt;br /&gt;
&lt;br /&gt;
== Beta State  ==&lt;br /&gt;
&lt;br /&gt;
#Publish the first (beta) list of &amp;quot;OWASP Cloud-10&amp;quot; (Oct 2009) &lt;br /&gt;
#Identify additional candidates &lt;br /&gt;
#……. (repeat steps as in Alpha)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Reference  ====&lt;br /&gt;
&lt;br /&gt;
== Related Efforts  ==&lt;br /&gt;
&lt;br /&gt;
#Cloud Security Alliance - http://www.cloudsecurityalliance.org/ &lt;br /&gt;
#IDC Aug 2008 Survey (Security #1) Challenge for Cloud/On-Demand Models - http://blogs.idc.com/ie/?p=210&lt;br /&gt;
&lt;br /&gt;
== Related OWASP Projects  ==&lt;br /&gt;
&lt;br /&gt;
#OWASP Top Ten Project &lt;br /&gt;
#OWASP Legal Project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Contributors  ====&lt;br /&gt;
&lt;br /&gt;
== Project Leaders  ==&lt;br /&gt;
&lt;br /&gt;
[[:User:vinaykbansal|'''Vinay Bansal''']]&amp;lt;br&amp;gt;[[User:Shankar Babu Chebrolu|Shankar Babu Chebrolu]]&amp;lt;br&amp;gt; [[User:Martin G. Nystrom|Martin G. Nystrom]]&amp;lt;br&amp;gt; [[User:Jim Born|Jim Born]] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/User:Ken_Huang Ken Huang] &lt;br /&gt;
&lt;br /&gt;
== Contributors  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
#[https://lists.owasp.org/mailman/listinfo/owasp-cloud-10 Subscribe or read the Cloud-10 mail archives]&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP Cloud ‐ 10 Project | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Cloud_-_Top_5_Risks_with_PAAS|&amp;lt;br&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Risks_with_SaaS&amp;diff=67640</id>
		<title>Cloud-10 Risks with SaaS</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Risks_with_SaaS&amp;diff=67640"/>
				<updated>2009-08-17T13:38:25Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: Added 4 references&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Potential security risks and loss of IT control topped the list of perceived barriers to SaaS adoption (Anthes, 2009). &amp;quot;On a list of 24 possible IT project priorities for 2009, a survey respondents ranks SaaS at No.23&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5 Risks:&lt;br /&gt;
&lt;br /&gt;
1. Data Security&lt;br /&gt;
     One company data co-mingled with other businesses' data (e.g: Salesforce.com)&lt;br /&gt;
&lt;br /&gt;
2. Lack of federated identity management&lt;br /&gt;
     Due to multiple identities of employees at multiple SaaS providers, an employee's access cannot be shut off automatically, following termination of an employee.&lt;br /&gt;
&lt;br /&gt;
3. Lack of strong service level agreements (SLAs) and contracts that hold people accountable should something happen.&lt;br /&gt;
&lt;br /&gt;
4. Lack of interoperability among vendors (Vendor Lock-in)&lt;br /&gt;
      Puts companies at risk if SaaS provider goes out of business or acquired by a competitor. Switching costs could be high. &lt;br /&gt;
&lt;br /&gt;
5. Web Application and Infrastructure Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Anthes, G.. (2009, January). SaaS Realities. Computerworld, 43(1), 21-22.  Retrieved August 9, 2009, from ABI/INFORM Global. (Document ID: 1626575741).&lt;br /&gt;
&lt;br /&gt;
Business: Pain in the aaS; Computer security. (2008, April). The Economist, 387(8577), 86.  Retrieved August 9, 2009, from ABI/INFORM Global. (Document ID: 1469385981). &lt;br /&gt;
&lt;br /&gt;
Gartner: Seven Cloud-Computing Security Risks. http://www.cio.com/article/423713/Gartner_Seven_Cloud_Computing_Security_Risks?page=1&amp;amp;taxonomyId=1419&lt;br /&gt;
&lt;br /&gt;
Google: Cloud computing more secure than traditional IT. http://www.computerweekly.com/Articles/2009/07/21/236982/cloud-computing-more-secure-than-traditional-it-says.htm&lt;br /&gt;
&lt;br /&gt;
Top five cloud computing security issues. http://www.computerweekly.com/Articles/2009/04/24/235782/top-five-cloud-computing-security-issues.htm&lt;br /&gt;
&lt;br /&gt;
Cloud Security Alliance. http://www.cloudsecurityalliance.org/guidance/csaguide.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Risks_with_SaaS&amp;diff=67394</id>
		<title>Cloud-10 Risks with SaaS</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Risks_with_SaaS&amp;diff=67394"/>
				<updated>2009-08-09T12:26:32Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Potential security risks and loss of IT control topped the list of perceived barriers to SaaS adoption (Anthes, 2009). &amp;quot;On a list of 24 possible IT project priorities for 2009, a survey respondents ranks SaaS at No.23&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5 Risks:&lt;br /&gt;
&lt;br /&gt;
1. Data Security&lt;br /&gt;
     One company data co-mingled with other businesses' data (e.g: Salesforce.com)&lt;br /&gt;
&lt;br /&gt;
2. Lack of federated identity management&lt;br /&gt;
     Due to multiple identities of employees at multiple SaaS providers, an employee's access cannot be shut off automatically, following termination of an employee.&lt;br /&gt;
&lt;br /&gt;
3. Lack of strong service level agreements (SLAs) and contracts that hold people accountable should something happen.&lt;br /&gt;
&lt;br /&gt;
4. Lack of interoperability among vendors (Vendor Lock-in)&lt;br /&gt;
      Puts companies at risk if SaaS provider goes out of business or acquired by a competitor. Switching costs could be high. &lt;br /&gt;
&lt;br /&gt;
5. Web Application and Infrastructure Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Anthes, G.. (2009, January). SaaS Realities. Computerworld, 43(1), 21-22.  Retrieved August 9, 2009, from ABI/INFORM Global. (Document ID: 1626575741).&lt;br /&gt;
&lt;br /&gt;
Business: Pain in the aaS; Computer security. (2008, April). The Economist, 387(8577), 86.  Retrieved August 9, 2009, from ABI/INFORM Global. (Document ID: 1469385981). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Risks_with_SaaS&amp;diff=67393</id>
		<title>Cloud-10 Risks with SaaS</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Risks_with_SaaS&amp;diff=67393"/>
				<updated>2009-08-09T12:17:43Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Potential security risks and loss of IT control topped the list of perceived barriers to SaaS adoption (Anthes, 2009). &amp;quot;On a list of 24 possible IT project priorities for 2009, a survey respondents ranks SaaS at No.23&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5 Risks:&lt;br /&gt;
&lt;br /&gt;
1. Data Security&lt;br /&gt;
&lt;br /&gt;
2. Lack of federated identity management&lt;br /&gt;
     Due to multiple identities of employees at multiple SaaS providers, an employee's access cannot be shut off automatically, following termination of an employee.&lt;br /&gt;
&lt;br /&gt;
3. Lack of strong service level agreements (SLAs) and contracts that hold people accountable should something happen.&lt;br /&gt;
&lt;br /&gt;
4. Lack of interoperability among vendors (Vendor Lock-in)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Anthes, G.. (2009, January). SaaS Realities. Computerworld, 43(1), 21-22.  Retrieved August 9, 2009, from ABI/INFORM Global. (Document ID: 1626575741).&lt;br /&gt;
&lt;br /&gt;
Business: Pain in the aaS; Computer security. (2008, April). The Economist, 387(8577), 86.  Retrieved August 9, 2009, from ABI/INFORM Global. (Document ID: 1469385981). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Risks_with_SaaS&amp;diff=67392</id>
		<title>Cloud-10 Risks with SaaS</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Risks_with_SaaS&amp;diff=67392"/>
				<updated>2009-08-09T11:53:15Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Potential security risks and loss of IT control topped the list of perceived barriers to SaaS adoption (Anthes, 2009). &amp;quot;On a list of 24 possible IT project priorities for 2009, a survey respondents ranks SaaS at No.23&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5 Security Risks:&lt;br /&gt;
&lt;br /&gt;
1. Data Security&lt;br /&gt;
2. Lack of federated identity management&lt;br /&gt;
3. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Anthes, G.. (2009, January). SaaS Realities. Computerworld, 43(1), 21-22.  Retrieved August 9, 2009, from ABI/INFORM Global. (Document ID: 1626575741).&lt;br /&gt;
&lt;br /&gt;
Business: Pain in the aaS; Computer security. (2008, April). The Economist, 387(8577), 86.  Retrieved August 9, 2009, from ABI/INFORM Global. (Document ID: 1469385981). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Risks_with_SaaS&amp;diff=66653</id>
		<title>Cloud-10 Risks with SaaS</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Risks_with_SaaS&amp;diff=66653"/>
				<updated>2009-07-27T14:13:15Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Placeholder&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Cloud ‐ 10 Project]]&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cloud-10_Risks_with_SaaS&amp;diff=66652</id>
		<title>Cloud-10 Risks with SaaS</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cloud-10_Risks_with_SaaS&amp;diff=66652"/>
				<updated>2009-07-27T14:11:14Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: Created page with 'Placeholder'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Placeholder&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Shankar_Babu_Chebrolu&amp;diff=66651</id>
		<title>User:Shankar Babu Chebrolu</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Shankar_Babu_Chebrolu&amp;diff=66651"/>
				<updated>2009-07-27T13:23:57Z</updated>
		
		<summary type="html">&lt;p&gt;Shankar Babu Chebrolu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Shankar Babu Chebrolu (CISSP, GIAC) is an IT Security Architect responsible for securing web based applications in Customer Value Chain Management at Cisco Systems, working closely with Cisco Supply Chain partners, Application Service Providers, Solution Vendors and Corporate Security Programs Organization (CSPO). He has worked at Cisco for about 9 years. Shankar Babu Chebrolu has been a speaker at conferences including Siebel Customer World, Oracle Open World, Oracle Applications User Group, CA World, Triangle InfoseCon presenting in his areas of expertise: securing web applications and integrating third party security models within Cisco Enterprise. Shankar holds a Master's Degree in Computer Science from Indian Institute of Technology (IIT), Mumbai, India and he is currently pursuing his PhD in Information Technology at Capella University.&lt;/div&gt;</summary>
		<author><name>Shankar Babu Chebrolu</name></author>	</entry>

	</feed>