Package CloudManagement
URI: CloudManagement
Description: Model of cloud hosting and automated management.
Faulty instances of the virtual device Host can be detected by monitoring, halted, and a replacement provisioned automatically. |
|
Faulty instances of the process Process can be detected by monitoring, halted, and a replacement provisioned automatically. |
|
Automated provisioning is specified at process Process but this is an inappropriate control selection because user Human is using the process interactively. |
|
The flow of data Data from FlowsFrom to FlowsTo can be automatically disabled to prevent corrupt or malicious content (including malware) from disrupting the receipient FlowsTo. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it also triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated. |
|
The flow of data Data from FlowsFrom to FlowsTo has been automatically disabled to prevent corrupt or malicious content (including malware) from disrupting the receipient FlowsTo. This strategy represents activation of a contingency plan at runtime, and can be enabled to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. Activation at runtime requires FlowsTo to be managed by a suitable adaptation framework. The Disabled Data Flow control should be deselected if and when the flow of data is enabled once again. |
|
Access to service Service by client Client may be automatically disabled to prevent the service forwarding excessive requests or becoming overloaded itself, at the cost of some reduction in availability. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it also triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated. |
|
Access to service Service by client Client has been automatically disabled to prevent the service forwarding excessive requests or becoming overloaded itself. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. Activation at runtime requires Service to be managed by a suitable adaptation framework. The Disable Client Access control should be deselected if and when access by Client to Service has been enabled once again. |
|
The sending of data Data from FlowsFrom to FlowsTo can be can be automatically disabled to prevent leaking of data. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it also triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated. |
|
The sending of data Data from FlowsFrom to FlowsTo has been automatically disabled to prevent leaking of data. This strategy represents activation of a contingency plan at runtime, and can be enabled to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. Activation at runtime requires FlowsFrom to be managed by a suitable adaptation framework. The Disabled Data Flow control should be deselected if and when the flow of data is enabled once again. |
|
Access to service Service by client Client may be automatically disabled to prevent authenticated attacks by impersonated clients, at the cost of some reduction in availability. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it also triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated. |
|
CSG-AutoSuspendUnauthenticClientAccess-Implementation-Runtime |
Access to service Service by client Client has been automatically disabled to prevent authenticated attacks by impersonated clients. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. Activation at runtime requires Service to be managed by a suitable adaptation framework. The Disable Client Access control should be deselected if and when access by Client to Service has been enabled once again. |
Access to service Service by client Client may be automatically disabled to prevent authenticated attacks by compromised clients, at the cost of some reduction in availability. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it also triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated. |
|
CSG-AutoSuspendUntrustworthyClientAccess-Implementation-Runtime |
Access to service Service by client Client has been automatically disabled to prevent authenticated attacks by compromised clients. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. Activation at runtime requires Service to be managed by a suitable adaptation framework. The Disable Client Access control should be deselected if and when access by Client to Service has been enabled once again. |
The (virtual) device Host is operating as a cluster, which allows automatic scaling in the number of instances to meet the load placed upon the host. This must be configured in advance, so it is a blocking strategy not a contingency plan or run-time threat response. |
|
The use of resources by host Host are limited to the level specified in a service level agreement with the hosting data centre DataCentre. |
|
The use of resources by host Host are limited to the level specified in a service level agreement with the hosting data centre DataCentre. |
The Process is managed by a data governance framework such as Fybrik, which can modify its behaviour without the intervention of a human manager. |
|
Instances of the (virtual) Host can be automatically provisioned to increase capacity to meet loads from hosted processes or other virtual hosts. |
|
The host is subject to a service level agreement negotiated with its data centre that places limits on how far it can be elastically scaled up to meet demand. |
|
There is a means to enforce capacity limits for the resources allocated to a virtual host. |
A reverse proxy providing access to virtual host login and admin functions in a cloud data centre. |
|
An master node in a virtual cluster supporting automated management of services in the cloud. |
|
An worker node in a virtual cluster supporting automated management of services in the cloud. |
|
An overlay network connecting nodes in a virtual cluster supporting automated management of services in the cloud. |
|
A virtual host configured to run a service that can be automatically deployed and managed in the cloud. |
|
A reverse proxy providing access to services that are deployed and managed automatically in a cloud data centre. |
|
A cloud deployment context for one or more Containers, modelled as a type of host. |
A proxy for running commands on a Container within a K8S or Docker platform or equivalent. Behaves like a login service on a bastion server, providing shell access via a front-end system (the K8s Master Node) to login services on the Containers. It is not itself a login service, as it does not provide shell access on its own host. The default trustworthiness levels are set on the assumption that this asset will be subject to penetration testing by the data centre operator before it is used. |
|
A subnet implemented by K8S using iptables rules to provide connectivity to Pods and Services using networks connecting their hosts. |
|
A simple virtual host containing software needed to support a packaged process, suitable for deployment via Docker or Kubernetes. |
|
A proxy for accessing services running in a Container under a K8S or equivalent platform. The default trustworthiness levels are set on the assumption that this asset will be subject to penetration testing by the data centre operator before it is used. |
|
A VM that forms part of a virtual cluster managed by a framework such as Kubernetes, but is used to host control plane functions of the management framework. |
|
A virtual host containing support for sharing a virtual network and storage services with one or more Containers. |
|
A CloudWorker represents a virtual cluster of worker nodes, which is allocated and managed via a framework such as Kubernetes. |