Identification, authentication and authorization:
Multi-tenancy requires that consumers share common
resources in public domain. Identification of correct
resources to authorized users is an important aspect of this
security control. The users should be identified by key
management and passwords. Cloud providers should also
provide access controls to users, so that they can give rights
to other authorized users. Compliance models: STIG [13],
FedRAMP [5], Oauth and NIST 800-63. NIST classifies
access control as a separate control supported by SOX [22]
and Safe Harbor [16].