Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud

2021 ◽  
pp. 129-138
Author(s):  
Junchao Wang ◽  
Jianmin Pang ◽  
Jin Wei
IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 29158-29172 ◽  
Author(s):  
Xueyuan Yin ◽  
Xingshu Chen ◽  
Lin Chen ◽  
Guolin Shao ◽  
Hui Li ◽  
...  

Author(s):  
Yushi Shen ◽  
Yale Li ◽  
Ling Wu ◽  
Shaofeng Liu ◽  
Qian Wen

This chapter is about guidance and implementation prepared by the Cloud Security Alliance (CSA) Security as a Service (SecaaS) workgroup, which is made up of users and practitioners in the field of information security. In preparing this implementation guide, input has been sought from experts throughout Europe, the Middle East, and the United States. A lot of professional judgment and experience are applied in the architecture, engineering, and implementation of a Security Information and Event Management (SIEM) guide to ensure that it logs the information necessary to successfully increase visibility and remove ambiguity, surrounding the security events and risks that an organization faces. By providing SIEM as a service under SecaaS, the provider has to be able to accept log and event information, customer information and event feeds, and conduct information security analysis, correlation, and support incident response. By providing flexible real-time access to SIEM information, it allows the party consuming the SIEM service to identify threats acting against their environment cloud. This identification then allows for the appropriate action and response to be taken to protect or mitigate the threat. The simple step of increasing visibility and removing ambiguity is a powerful tool to understanding the information security risks that an organization is facing.


1978 ◽  
Vol 3 (1) ◽  
pp. 42-55 ◽  
Author(s):  
Hans Braunschweiler

Sign in / Sign up

Export Citation Format

Share Document