13.07.2015 Views

Download - Cloud Security Alliance

Download - Cloud Security Alliance

Download - Cloud Security Alliance

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CLOUD SECURITY ALLIANCE SecaaS Implementation Guidance, Category 6: Intrusion Management3.2.4 Technical Performance Concerns........................................................................................................... 173.2.5 General Challenges................................................................................................................................. 173.2.6 Specific to <strong>Cloud</strong> Consumers .................................................................................................................. 173.2.7 Specific to <strong>Cloud</strong> Service Providers ........................................................................................................ 174.0 Implementation................................................................................................................................................. 194.1 Architectural Overview.................................................................................................................................. 194.1.1 Intrusion Detection Framework ............................................................................................................. 194.1.2 Intrusion Detection and Protection Architecture................................................................................... 214.1.3 Network-Based Detection ...................................................................................................................... 224.1.4 Virtualization Layer Detection................................................................................................................ 254.1.5 Client-Based Detection........................................................................................................................... 274.1.6 Application Layer Detection ................................................................................................................... 284.1.7 Hybrid Solutions ..................................................................................................................................... 294.2 <strong>Cloud</strong>-Provided IM SecaaS Implementation.................................................................................................. 314.2.1 Intrusion Management Infrastructure ................................................................................................... 314.2.2 Policy Implementation............................................................................................................................ 315.0 References and Useful Links.............................................................................................................................. 335.1 References..................................................................................................................................................... 335.2 Useful Links.................................................................................................................................................... 33© Copyright 2012, <strong>Cloud</strong> <strong>Security</strong> <strong>Alliance</strong>. All rights reserved. 4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!