【24h】

A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management

机译:云攻击后果和缓解策略的分类法:访问控制和特权访问管理的作用

获取原文

摘要

Cloud services are now used by many organizations for the computation and storage of both public and sensitive data. Organizations expect that the data stored on clouds will be reasonably protected in terms of confidentiality, integrity and availability (CIA). In this paper, we review the cloud security literature to determine key contemporary attack consequences and mitigation strategies in the cloud environment. We categorize the consequences and mitigation strategies using the people, process and technology (PPT) and CIA classifications. We then construct a taxonomy of consequences and mitigation strategies, and use the themes discovered to present a conceptual privileged access management architecture.
机译:现在,许多组织将云服务用于公共数据和敏感数据的计算和存储。组织期望存储在云上的数据在机密性,完整性和可用性(CIA)方面得到合理保护。在本文中,我们回顾了云安全性文献,以确定在云环境中关键的当代攻击后果和缓解策略。我们使用人员,流程和技术(PPT)和CIA的分类对后果和缓解策略进行分类。然后,我们构建后果和缓解策略的分类法,并使用发现的主题来呈现概念性特权访问管理体系结构。

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号