expand for answer

Security Perimeter

Boundary where security controls are in effect to protect assets. The imaginary boundary that separates the trusted computing base from the rest of the system.


Similar items:
The combination of hardware, software, and controls that form a trusted base that enforces your security policy. The totality of protection mechanisms within a computer system, including hardware, software, and communications equipment, the combination of which is responsible for enforcing a security policy. A TCB consists of one or more components that together enforce a unified security policy over a product or system. The ability of a trusted computing base to correctly enforce a security policy depends solely on the mechanisms within the TCB and on the correct input by system administrative personnel of parameters (such as a user’s clearance) related to the security policy. Totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination responsible for enforcing a security policy.
[view]
<p>NIST Cloud Computing Security Reference Architecture</p><p>The purpose of this document is to define a NIST Cloud Computing Security Reference Architecture (NCC-SRA)--a framework that: <br>1. Identifies a core set of Security Components that can be implemented in a Cloud Ecosystem to secure the environment, the operations, and the data migrated to the cloud; <br>2. Provides, for each Cloud Actor, the core set of Security Components that fall under their responsibilities depending on the deployment and service models; <br>3. Defines a security-centric formal architectural model that adds a security layer to the current NIST SP 500-292, "NIST Cloud Computing Reference Architecture"; and <br>4. Provides several approaches for analyzing the collected and aggregated data.</p>
[view]
<p>NIST 800-146, titled Cloud Computing Synopsis and Recommendations, reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, and provides an overview of major classes of cloud technology</p>
[view]
A shared boundary between devices, equipment, or software components defined by common interconnection characteristics. Common boundary between independent systems or modules where interactions take place.
[view]
Noncomputing methods are security safeguards that do not use the hardware, software, and firmware of the IS. Traditional methods include physical security (controlling physical access to computing resources), personnel security, and procedural security.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in