Security Management for ASP (10)

Source: Internet
Author: User
Tags file system time and date zip
Safety Summary
Protecting the customer and ASP's data from malicious attacks (intentional or unintentional) is the entire content of security management. A clear understanding of what security management is and how the ASP and its customers can take it is critical, including what security policies are and what level of security needs to be achieved. You need to determine the SLA itself and the level of security it provides, and you need to take appropriate security measures. Security measures include people, processes, and technology. Processes involve communication, upgrades, and processes and procedures around security management. Personnel need to be trained and able to understand and implement all the security measures and the evolving technologies that accompany them.

All aspects should be considered comprehensively to ensure that the level of security meets the requirements of the ASP's customers.

Other information
Acronyms
AD:

Active Directory


Asp:

Application Service Provider


CCTA:

Central Computer and Telecommunications Agency (UK)


Ci:

Configuring the Project


CMDB:

Configuration Management Database


CRAMM:

CCTA risk analysis and management methods


Crm:

Customer Relationship Management


Efs:

Encrypting File System


ESf:

Enterprise Services Framework


Itil:

IT Infrastructure Library


Ldap:

Lightweight Directory Access Protocol


Mof:

Microsoft Operational Framework


MRF:

Microsoft Preparation Work Framework


Msf:

Microsoft Solution Framework


Ntfs:

NT File System


Ntlm:

NT LAN Management


Pki:

Public key basic structure


Sla:

Service-level agreements


Ssl:

Cryptographic Socket Protocol Layer


Upn:

User principal Name


Vpn:

Virtual Private Network


Bibliographic
The following books are bibliographies or recommended readings for this white paper, helping to further understand the concepts included here:

Security Management,it Service Management FORUM/CCTA,ITIMF Ltd.,
ISBN 0 330014 X.

Contingency planning,it Service Management FORUM/CCTA,ITIMF Ltd.,
ISBN 0 11 330524 9.

Capacity management,it Service Management forum/ccta,itimf Ltd.,
ISBN 0 11 330544 3.

Service level Management,it Service Management FORUM/CCTA,ITIMF Ltd.,
ISBN 0 11 330521 4.

Availability management,it Service Management FORUM/CCTA,ITIMF Ltd.,
ISBN 0 11 330551 6.

Security Management Reference
This section concentrates on all references in the main body of this article, listed in alphabetical order by topic.

Active Directory
Http://www.microsoft.com/windows2000/guide/server/features/activedirectory.asp

ASP Industry Consortium
http://www.aspindustry.org/

Top practices (best Practices)
Http://www.aspindustry.org/members/BestPractices/DeliveryModel.cfm
Http://www.microsoft.com/ISN/downloads/Best Practices documentation for ASPs.zip

CCTA Risk Analysis and Management methods (CCTA risk analyses and management method)
http://www.crammusergroup.org.uk

Forum for Incident Response and security teams (incident Response and Safety Group Forum, I)
Http://www.first.org/about/first-description.html

Gartner Group, J.pescatore, "Critical security Questions to as a ASP", df-10-0972, February 2000
http://www.gartner.com/

International Information Systems Security certification Consortium
Http://www.sans.org/snap.htm

IT infrastructure Library.
http://www.itil.co.uk/

Microsoft Operations Framework (Microsoft Operations Architecture)
Http://www.microsoft.com/enterpriseservices/MOF.htm

Microsoft telecommunications Consulting Practice, Steve Riley, "Network Security Best Practices", 7 August 2000
Http://www.microsoft.com/technet/

Microsoft Terminal Services Scaling (Microsoft Terminal Service scaling)
Http://www.microsoft.com/windows2000/library/technologies/terminal/tscaling.asp
Http://www.microsoft.com/WINDOWS2000/library/resources/reskit/tools/hotfixes/tscpt-o.asp

Microsoft Windows Performance Tuning (Microsoft Windows 2000 Performance Tuning)
Http://www.microsoft.com/WINDOWS2000/guide/platform/performance/reports/perftune.asp

Microsoft. NET
http://www.microsoft.com/net/

Microsoft Windows Management Instrumentation (Microsoft Windows Management Specification)
Http://www.microsoft.com/ISN/downloads/Operations for ASPs.zip

Microsoft Enterprise Services Frameworks (ESF) publications (Microsoft Enterprise Services architecture publication)
http://www.microsoft.com/enterpriseservices/

Writer
Unisys Corporation:jeroen Bom, Joe Helm, Hilda Willems, Tom Wu

Microsoft Corporation:kathryn Rupchock, Kent Sarff

Appendix A:sla in the Security Section
The following topics need to be discussed in the Security section of the SLA:
General strategy of Information security
Allowed access methods and user identification (ID) and password management and use
ASP's obligation to keep the list of authorized persons
Protocols on auditing and logging
The obligation to record the ASP's security-related management activities
Time and date when the solution is valid (take back equipment into account if necessary)
Obligations of customers, vendors, and ASPs (in accordance with the responsibilities of ASP, customers and vendors)
Steps to protect ASP and customer assets (including information)
Responsibility for the Legal affairs
The right to supervise the activities of customers and manufacturers (and the right to revoke the right)
Responsibility for installation and maintenance of equipment and software
Right to check contractual liability
Restrictions on the replication and disclosure of information
Methods used to ensure that information or goods are destroyed or returned at the time of SLA termination
Any physical security measures that are required
The management process of information security in ASP
Steps to ensure that security measures are faithfully and effectively
Training of users (both internal and external) in security policies, methods, and procedures
Measures to ensure non-proliferation of computer viruses and other attacks
Authorization steps to access permissions for a user



Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.