Applying a Threat Model to Cloud Computing

2018 International Carnahan Conference on Security Technology (ICCST)(2018)

引用 4|浏览17
暂无评分
摘要
Cloud infrastructure presents new paradigms in efficiency and economy, but also bring along a new threat surface for cyber defenders to contend with. Each unique cloud computing model varies the characteristics of the cloud platform when compared to the traditional on-premise computing network. Characteristics such as shared security responsibility between the cloud provider and tenant, reduced levels of cyber visibility and response capability, on-demand computing resources, cloud-based and more complex identity and access management, and various other characteristics impact the results of applying a threat model to the cloud computing platform. Thus, the threat modeling of cloud platforms must consider a new model of shared responsibility. The threat model should recognize an approach that requires the end user to explicitly trust the cloud service provider in their respective areas of responsibility, and must consider new or modified threats. Organizations migrating their computer network from a more traditional on-premise system to cloud-based services must consider the classes of threats that any computer network faces, but also the impacts resulting from cloud unique characteristics. In this paper, we select and apply a threat model to a cloud platform. Specific cloud unique characteristics are identified, and discussions on their impact to the threat model results are described.
更多
查看译文
关键词
cloud computing,cyber security,cyber threat
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要