This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Cloud-10 Guidelines"
From OWASP
Vinaykbansal (talk | contribs) |
Vinaykbansal (talk | contribs) |
||
| Line 22: | Line 22: | ||
4. Operations | 4. Operations | ||
#Patching | #Patching | ||
| + | |||
| + | |||
| + | == Use Cases == | ||
| + | |||
| + | #Deploying Third Party | ||
| + | #Building Your Own Application | ||
| + | |||
| + | |||
| + | *Target Environment | ||
Revision as of 14:06, 1 November 2011
1. Development / Environment Setting
a) Developer Access
- Jump Server
- Multi factor Autch
- VPN/Cert based Authc
2. Architecture
- Tiering
- Communicaiton
- between zones
- within tiers
- ACLs
- AuthC/Identity
- Encryption
- WAF
3. Deployment and Testing
- Hardening
4. Operations
- Patching
Use Cases
- Deploying Third Party
- Building Your Own Application
- Target Environment