This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Cloud-10 Guidelines"
From OWASP
Vinaykbansal (talk | contribs) |
Vinaykbansal (talk | contribs) |
||
Line 22: | Line 22: | ||
4. Operations | 4. Operations | ||
#Patching | #Patching | ||
+ | |||
+ | |||
+ | == Use Cases == | ||
+ | |||
+ | #Deploying Third Party | ||
+ | #Building Your Own Application | ||
+ | |||
+ | |||
+ | *Target Environment |
Revision as of 14:06, 1 November 2011
1. Development / Environment Setting
a) Developer Access
- Jump Server
- Multi factor Autch
- VPN/Cert based Authc
2. Architecture
- Tiering
- Communicaiton
- between zones
- within tiers
- ACLs
- AuthC/Identity
- Encryption
- WAF
3. Deployment and Testing
- Hardening
4. Operations
- Patching
Use Cases
- Deploying Third Party
- Building Your Own Application
- Target Environment