13.07.2015 Views

Download - Cloud Security Alliance

Download - Cloud Security Alliance

Download - Cloud Security Alliance

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CLOUD SECURITY ALLIANCE SecaaS Implementation Guidance, Category 6: Intrusion ManagementContentsForeword ....................................................................................................................................................................5Letter from the Co-Chairs...........................................................................................................................................6Acknowledgments ......................................................................................................................................................71.0 Introduction..........................................................................................................................................................81.1 Intended Audience ...........................................................................................................................................81.2 Scope ................................................................................................................................................................81.2.1 Functional Areas Covered..........................................................................................................................91.2.2 <strong>Cloud</strong>-Delivered Versus Traditional Intrusion Services .............................................................................91.2.3 Related SecaaS Categories and Guidance .................................................................................................92.0 Requirements Addressed .................................................................................................................................. 102.1 Intrusion Detection and Response ................................................................................................................ 102.1.1 Techniques and Strategies...................................................................................................................... 102.1.2 Correlation and Response ...................................................................................................................... 122.2 Intrusion Management.................................................................................................................................. 122.2.1 Element Management and Incident Reporting...................................................................................... 132.2.2 Infrastructure for IM SecaaS................................................................................................................... 132.2.3 Service Standards and Functions............................................................................................................ 132.3 Service Levels and Business Model Requirements........................................................................................ 133.0 Considerations and Concerns............................................................................................................................ 153.1 Considerations............................................................................................................................................... 153.1.1 Service Level Agreement Language........................................................................................................ 153.1.2 Financial Considerations......................................................................................................................... 153.1.3 Technical Considerations........................................................................................................................ 153.1.4 Architecture Considerations................................................................................................................... 153.1.5 <strong>Security</strong> Considerations.......................................................................................................................... 163.2 Concerns........................................................................................................................................................ 163.2.1 Gaps with the Provider Solution............................................................................................................. 163.2.2 Integration Concerns .............................................................................................................................. 163.2.3 Environmental and <strong>Security</strong> Concerns ................................................................................................... 17© Copyright 2012, <strong>Cloud</strong> <strong>Security</strong> <strong>Alliance</strong>. All rights reserved. 3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!