This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Cloud Top 5 Risks with IAAS"

From OWASP
Jump to: navigation, search
(Created page with '<span class="Apple-style-span" style="line-height: normal; -webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px;">IAAS serves as the foundation layer for …')
 
Line 1: Line 1:
<span class="Apple-style-span" style="line-height: normal; -webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px;">IAAS serves as the foundation layer for the cloud computing. The Top security concerns are:</span>
+
IAAS serves as the foundation layer for the cloud computing. The Top security concerns are:  
  
<span class="Apple-style-span" style="line-height: normal; -webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px;" />
+
&lt;span class="Apple-style-span" style="line-height: normal; -webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px;" /&gt;
  
1) If the business mission critical application is hosted in IAAS environment, the down time due to man mad or nature disaster could introduce significant business risks. There are examples of some companies went bankrupt due to FBI investigation of data breach in IAAS enviroement.
+
1) If the business mission critical application is hosted in IAAS environment, the down time due to man mad or nature disaster could introduce significant business risks. There are examples of some companies went bankrupt due to FBI investigation of data breach in IAAS enviroement.  
  
 +
<br>
  
 +
2) Physical security of the IAAS environment.&nbsp;
  
2) Physical security of the IAAS environment.&nbsp;
+
<br>
  
 +
3) The Service Level Agreement
  
 +
<br>
  
3) The Service Level Agreement
+
4) Compatibility of IAAS and internal legacy infrastructure.
  
 +
<br>
  
 +
5) Regulatory compliance
  
4) Compatibility of IAAS and internal legacy infrastructure.
+
<br>
  
 
+
[[Category:OWASP Cloud ‐ 10 Project]]
 
 
5) Regulatory compliance
 
 
 
<span class="Apple-style-span" style="line-height: normal; -webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px;" />
 

Revision as of 00:13, 23 October 2009

IAAS serves as the foundation layer for the cloud computing. The Top security concerns are:

<span class="Apple-style-span" style="line-height: normal; -webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px;" />

1) If the business mission critical application is hosted in IAAS environment, the down time due to man mad or nature disaster could introduce significant business risks. There are examples of some companies went bankrupt due to FBI investigation of data breach in IAAS enviroement.


2) Physical security of the IAAS environment. 


3) The Service Level Agreement


4) Compatibility of IAAS and internal legacy infrastructure.


5) Regulatory compliance