1. Define protection that enable trust in the cloud
2. Develop cross-platform capabilities and patterns for proprietary and open source providers.
3. Facilitate trusted and efficient access, administration, and resiliency to the customer or consumer.
4. Provide direction to secure information that is protected by regulations.
5. Facilitate proper and efficient identification, authentication, authorization, administration, and auditability.
6. Centralize security policy, maintenance operation, and oversight functions.
7. Make access to information both secure and easy to obtain.
8. Delegate of federate access control where appropriate.
9. Ensure ease of adoption and consumption, supporting the design of security patterns.
10. Make the architecture elastic, flexible, and resilient, supporting mutitenant, mutilandlord platforms.
11. Ensure the architecture address and support multiple levels of protection, including network, OS, and application security needs.
沒有留言:
張貼留言