Figure 6: Auckland security management plan
b. The controls baseline tailoring process. The CCs decide
which security controls in the baseline they plan to replace
with common security controls provided by the CP or the
CC, as shown in Figure 5. Then SWINSOFT, Auckland, and
Swinburne select the critical service components that must
be secured. Swinburne and Auckland define their security
controls’ parameter configurations. The security controls
provided by the cloud platform can only be reviewed.
The final outcome of this step is a security management
plan that documents the service security categorization,
vulnerabilities, threats, risks, and the tailored security
controls to mitigate the identified possible security breaches,
as shown in Figure 6
Figure 6: Auckland security management plan
b. The controls baseline tailoring process. The CCs decide
which security controls in the baseline they plan to replace
with common security controls provided by the CP or the
CC, as shown in Figure 5. Then SWINSOFT, Auckland, and
Swinburne select the critical service components that must
be secured. Swinburne and Auckland define their security
controls’ parameter configurations. The security controls
provided by the cloud platform can only be reviewed.
The final outcome of this step is a security management
plan that documents the service security categorization,
vulnerabilities, threats, risks, and the tailored security
controls to mitigate the identified possible security breaches,
as shown in Figure 6
การแปล กรุณารอสักครู่..