Security checklist for IaaS cloud deployments

M. Héder,F. Bisztray,Gy. Lakatos,G. Malasits,P. Ormos,E. Prunk-Éger,J. Rigó,Sz. Tenczer,E. Rigó
DOI: https://doi.org/10.48550/arXiv.1608.08787
2016-08-31
Abstract:In this article, we provide a cloud-security checklist for IaaS cloud deployments. The elements of the checklist are established by surveying the related literature on cloud-threat models and various security recommendations. We define the elements of the list on a level of abstraction that helps keep the size of the list manageable while preserving the list's practical applicability.
Cryptography and Security
What problem does this paper attempt to address?