expand for answer

Cloud services broker

A third-party entity or company that looks to extend or enhance value to multiple customers of cloud services through relationships with multiple cloud providers



Similar items:
<p>A security controls framework that provides mapping/cross relationships with the main industry-accepted security standards, regulations, and controls frameworks such as the ISO 27001/27002, ISACA’s COBIT, and PCI-DSS</p><p>The CSA CCM (Cloud Controls Matrix) provides fundamental security principles that guide cloud vendors and assist prospective cloud customers in assessing the overall security risk of a cloud provider.<br></p>
[view]
<p>NIST Cloud Computing Security Reference Architecture</p><p>The purpose of this document is to define a NIST Cloud Computing Security Reference Architecture (NCC-SRA)--a framework that: <br>1. Identifies a core set of Security Components that can be implemented in a Cloud Ecosystem to secure the environment, the operations, and the data migrated to the cloud; <br>2. Provides, for each Cloud Actor, the core set of Security Components that fall under their responsibilities depending on the deployment and service models; <br>3. Defines a security-centric formal architectural model that adds a security layer to the current NIST SP 500-292, "NIST Cloud Computing Reference Architecture"; and <br>4. Provides several approaches for analyzing the collected and aggregated data.</p>
[view]
A set of values representing a specific entity belonging to a particular entity type. A single value is also the instance of a data item. An occurrence of an entity class that can be uniquely described. In object-oriented programming, an instance can be an object, example, or representation of a class.
[view]
Data that is transferred to establish the claimed identity of an entity. Information, passed from one entity to another, used to establish the sending entity’s access rights.
[view]
(1) The process, generally employing unique machinereadable names, that enables recognition of users or resources as identical to those previously described to the computer system. (2) The assignment of a name by which an entity can be referenced. The entity may be high level (such as a user) or low level (such as a process or communication channel). Process an information system uses to recognize an entity. The process by which a subject professes an identity and accountability is initiated. The identification process can consist of a user providing a username, a logon ID, a PIN, or a smart card or a process providing a process ID number.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in