ImageVerifierCode 换一换
格式:PDF , 页数:22 ,大小:989.88KB ,
资源ID:804724      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-804724.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T X 1602-2016 Security requirements for software as a service application environments (Study Group 17)《软件作为服务应用环境的安全要求(研究组17)》.pdf)为本站会员(orderah291)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T X 1602-2016 Security requirements for software as a service application environments (Study Group 17)《软件作为服务应用环境的安全要求(研究组17)》.pdf

1、 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1602 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2016) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Cloud computing security Cloud computing security design Security requirements for software a

2、s a service application environments Recommendation ITU-T X.1602 ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS X.1X.199 OPEN SYSTEMS INTERCONNECTION X.200X.299 INTERWORKING BETWEEN NETWORKS X.300X.399 MESSAGE HANDLING SYSTEMS X.400X.499 DI

3、RECTORY X.500X.599 OSI NETWORKING AND SYSTEM ASPECTS X.600X.699 OSI MANAGEMENT X.700X.799 SECURITY X.800X.849 OSI APPLICATIONS X.850X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY General security aspects X.1000X.1029 Network security X.1030X.1049 Security management X.

4、1050X.1069 Telebiometrics X.1080X.1099 SECURE APPLICATIONS AND SERVICES Multicast security X.1100X.1109 Home network security X.1110X.1119 Mobile security X.1120X.1139 Web security X.1140X.1149 Security protocols X.1150X.1159 Peer-to-peer security X.1160X.1169 Networked ID security X.1170X.1179 IPTV

5、 security X.1180X.1199 CYBERSPACE SECURITY Cybersecurity X.1200X.1229 Countering spam X.1230X.1249 Identity management X.1250X.1279 SECURE APPLICATIONS AND SERVICES Emergency communications X.1300X.1309 Ubiquitous sensor network security X.1310X.1339 PKI related Recommendations X.1340X.1349 CYBERSEC

6、URITY INFORMATION EXCHANGE Overview of cybersecurity X.1500X.1519 Vulnerability/state exchange X.1520X.1539 Event/incident/heuristics exchange X.1540X.1549 Exchange of policies X.1550X.1559 Heuristics and information request X.1560X.1569 Identification and discovery X.1570X.1579 Assured exchange X.1

7、580X.1589 CLOUD COMPUTING SECURITY Overview of cloud computing security X.1600X.1601 Cloud computing security design X.1602X.1639 Cloud computing security best practices and guidelines X.1640X.1659 Cloud computing security implementation X.1660X.1679 Other cloud computing security X.1680X.1699 For f

8、urther details, please refer to the list of ITU-T Recommendations. Rec. ITU-T X.1602 (03/2016) i Recommendation ITU-T X.1602 Security requirements for software as a service application environments Summary Recommendation ITU-T X.1602 analyses the maturity levels of software as a service (SaaS) appli

9、cation and proposes security requirements to provide a consistent and secure service execution environment for SaaS applications. These proposed requirements originate from cloud service providers (CSP) and cloud service partners (CSN) as they need a SaaS application environment to meet their demand

10、s on security. The requirements are general and independent of any service or scenario specific model (e.g., web services, or representational state transfer (REST), assumptions or solutions. History Edition Recommendation Approval Study Group Unique ID* 1.0 ITU-T X.1602 2016-03-23 17 11.1002/1000/1

11、2615 Keywords Security requirement, software as a service (SaaS) application environment, SaaS maturity level. * To access the Recommendation, type the URL http:/handle.itu.int/ in the address field of your web browser, followed by the Recommendations unique ID. For example, http:/handle.itu.int/11.

12、1002/1000/11830-en. ii Rec. ITU- T X.1602 (03/2016) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a p

13、ermanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, esta

14、blishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary st

15、andards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the R

16、ecommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalen

17、ts are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed

18、 Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not

19、received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-

20、T/ipr/. ITU 2016 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T X.1602 (03/2016) iii Table of Contents Page 1 Scope . 1 2 References . 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defin

21、ed in this Recommendation . 1 4 Abbreviations and acronyms 2 5 Conventions 2 6 Overview . 2 7 Maturity levels of SaaS application 3 7.1 Level 1: Custom SaaS application 3 7.2 Level 2: Configurable SaaS application . 4 7.3 Level 3: Multi-tenant SaaS application 5 7.4 Level 4: Scalable SaaS applicatio

22、n . 6 8 Security requirements for SaaS application environment 7 8.1 Common security requirements 8 8.2 Security requirements of CSP 11 8.3 Security requirements of CSN 12 Bibliography. 13 Rec. ITU-T X.1602 (03/2016) 1 Recommendation ITU-T X.1602 Security requirements for software as a service appli

23、cation environments 1 Scope This Recommendation focuses mainly on the security requirements of software as a service (SaaS) application environments based on the SaaS application maturity level. The target audiences of this Recommendation are cloud service providers (CSPs) and cloud service partners

24、 (CSNs) such as application developers. 2 References None. 3 Definitions 3.1 Terms defined elsewhere This Recommendation uses the following terms defined elsewhere: 3.1.1 cloud service b-ITU-T Y.3500: One or more capabilities offered via cloud computing invoked using a defined interface. 3.1.2 cloud

25、 service category b-ITU-T Y.3500: Group of cloud services that possess some common set of qualities. 3.1.3 cloud service customer b-ITU-T Y.3500: Party which is in a business relationship for the purpose of using cloud services. 3.1.4 cloud service partner b-ITU-T Y.3500: Party which is engaged in s

26、upport of, or auxiliary to, activities of either the cloud service provider or the cloud service customer, or both. 3.1.5 cloud service provider b-ITU-T Y.3500: Party which makes cloud services available. 3.1.6 cloud service user b-ITU-T Y.3500: Natural person, or entity acting on their behalf, asso

27、ciated with a cloud service customer that uses cloud services. 3.1.7 desktop as a service b-ITU-T Y.3500: The capabilities provided to the cloud service customer are the ability to build, configure, manage, store, execute, and deliver users desktop functions remotely. 3.1.8 infrastructure as a servi

28、ce (IaaS) b-ITU-T Y.3500: Cloud service category in which the cloud capabilities type provided to the cloud service customer is an infrastructure capabilities type. 3.1.9 software as a service (SaaS) b-ITU-T Y.3500: Cloud service category in which the cloud capabilities type provided to the cloud se

29、rvice customer is an application capabilities type. 3.2 Terms defined in this Recommendation None. 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: ASP Application Service Provider CaaS Communications as a Service 2 Rec. ITU-T X.1602 (03/2016) CRM Custo

30、mer Relationship Management CSC Cloud Service Customer CSN Cloud Service Partner CSP Cloud Service Provider DaaS Desktop as a Service IaaS Infrastructure as a Service IAM Identity and Access Management IdM Identity Management OLAP OnLine Analytical Processing OS Operating System PaaS Platform as a S

31、ervice PKI Public Key Infrastructure REST Representational State Transfer SaaS Software as a Service SAP Service Access Point SLA Service Level Agreement 5 Conventions None. 6 Overview A software as a service (SaaS) application environment is a service-oriented multi-tenant development, deployment a

32、nd execution environment in which software and its associated data are hosted centrally and are typically accessed on-demand by users using a client, e.g., a web browser, over the Internet. While this Recommendation is primarily concerned with SaaS, some of the concepts in this Recommendation may al

33、so be applicable to other cloud service categories that also include the application capabilities type, for example communications as a service (CaaS). Figure 1 depicts a conceptual model of a SaaS application environment. The underlying capabilities from infrastructure as a service (IaaS), platform

34、 as a service (PaaS) and desktop as a service (DaaS) will be encapsulated into services and provide consistent secure access using exported service access point (SAP). In this Recommendation, IaaS could provide computing services, storage services and network services; PaaS could provide platform se

35、rvice, and DaaS could provide desktop service for a SaaS application environment. All these services constitute the basic building blocks of an application development. Rec. ITU-T X.1602 (03/2016) 3 The environment also provides some necessary service management functions including service registrat

36、ion, service configuration, service orchestration, service dependency checking, service access control, service isolation, service monitoring and other service control functions. Figure 1 Conceptual model for the SaaS application environment 7 Maturity levels of SaaS application In the industry, the

37、 maturity of SaaS is classified into four levels which could be shortly named as custom level, configurable level, multi-tenant level, and scalable level. Each level covers characteristics of the previous one and provides extended characteristics. The diagram that represents the characteristics of t

38、he different SaaS maturity models is shown in Table 1. Table 1 Diagram of SaaS application maturity level Different maturity levels of the SaaS application have different security requirements to SaaS application environments, and the requirements will be illustrated from the viewpoint of CSPs and C

39、SNs in clause 8. 7.1 Level 1: Custom SaaS application Custom SaaS application is similar to the traditional application service provider (ASP) model of software delivery. Each customer has its own customized solution for SaaS application and runs its individual application instance on the cloud serv

40、er. As illustrated in Figure 2, the custom application instance comprises the whole execution environment including the operating system (OS), the data management system and the middleware that are specific to each tenant, and the SaaS environment provider has to maintain multiple instances. This mo

41、del is difficult to scale in order to satisfy the increasing requirement demands of customers, and it can be costly to operate. 4 Rec. ITU-T X.1602 (03/2016) Figure 2 Architecture of custom SaaS application The typical client-server model applications can be easily transformed into custom SaaS appli

42、cations by moving servers to the cloud with relatively little modification. The applications suitable for this scenario are usually developed with special requirements from the enterprise or organization. Top consideration will be given to security in the system itself, thus the usual way is to grou

43、p a set of physical machines into a private zone and to deploy a data management system (which provides abstracted methods of persistence and operations for different kinds of data) and associated software on it. The system is solely for internal usage with strict access control. The template of app

44、lication instance is the same for all customers, and it provides limited configuration ability. However, the instance for each customer is totally independent of any other instance. 7.2 Level 2: Configurable SaaS application For some commonly used applications that are not customized, such as self-s

45、ervice website building system, SaaS application providers offer common templates for these applications and several sets of run-time environment for the instances of these applications. Based on the same template, customers are able to create multiple separated instances of the application by confi

46、guring the applications appearance and behaviour, which are deployed and executed on individual virtual or physical machines to meet their customized requirements. Application instances are isolated from each other. The architecture is shown in Figure 3. Rec. ITU-T X.1602 (03/2016) 5 Figure 3 Archit

47、ecture of configurable SaaS application The configurable SaaS application has the following characteristics: 1) Application in the initial deployment is a copy of a standard product, and tenants configure the application to suit their own requirements. However, the configuration options of the produ

48、ct are limited. 2) For SaaS application providers, any modifications to the product codes can be easily applied to all tenants immediately. However, only a little update or optimization to the product codes are suitable for each instance because the forward compatibility problem incurred by the upda

49、te or optimization may occur. 3) Tenants store data in their own virtual machines or physical machines, which are isolated from each other. As a result, the SaaS environment provider has to provide sufficient resources such as storage to support a potentially large number of application instances running concurrently. With the development and improvement of software technology, the application will be provided with enough configuration options to meet the users customized requirements, and the configura

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1