Package CloudManagement

URI: CloudManagement

Description: Model of cloud hosting and automated management.

        (empty)

CSG-AutomatedHostFaultRecovery

Faulty instances of the virtual device Host can be detected by monitoring, halted, and a replacement provisioned automatically.

CSG-AutomatedProcessFaultRecovery

Faulty instances of the process Process can be detected by monitoring, halted, and a replacement provisioned automatically.

CSG-AutoProvisioningProcessError

Automated provisioning is specified at process Process but this is an inappropriate control selection because user Human is using the process interactively.

CSG-AutoSuspendCorruptDataFlow

The flow of data Data from FlowsFrom to FlowsTo can be automatically disabled to prevent corrupt or malicious content (including malware) from disrupting the receipient FlowsTo. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it also triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated.

CSG-AutoSuspendCorruptDataFlow-Implementation-Runtime

The flow of data Data from FlowsFrom to FlowsTo has been automatically disabled to prevent corrupt or malicious content (including malware) from disrupting the receipient FlowsTo. This strategy represents activation of a contingency plan at runtime, and can be enabled to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. Activation at runtime requires FlowsTo to be managed by a suitable adaptation framework. The Disabled Data Flow control should be deselected if and when the flow of data is enabled once again.

CSG-AutoSuspendExcessiveClientAccess

Access to service Service by client Client may be automatically disabled to prevent the service forwarding excessive requests or becoming overloaded itself, at the cost of some reduction in availability. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it also triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated.

CSG-AutoSuspendExcessiveClientAccess-Implementation-Runtime

Access to service Service by client Client has been automatically disabled to prevent the service forwarding excessive requests or becoming overloaded itself. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. Activation at runtime requires Service to be managed by a suitable adaptation framework. The Disable Client Access control should be deselected if and when access by Client to Service has been enabled once again.

CSG-AutoSuspendSensitiveDataFlow

The sending of data Data from FlowsFrom to FlowsTo can be can be automatically disabled to prevent leaking of data. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it also triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated.

CSG-AutoSuspendSensitiveDataFlow-Implementation-Runtime

The sending of data Data from FlowsFrom to FlowsTo has been automatically disabled to prevent leaking of data. This strategy represents activation of a contingency plan at runtime, and can be enabled to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. Activation at runtime requires FlowsFrom to be managed by a suitable adaptation framework. The Disabled Data Flow control should be deselected if and when the flow of data is enabled once again.

CSG-AutoSuspendUnauthenticClientAccess

Access to service Service by client Client may be automatically disabled to prevent authenticated attacks by impersonated clients, at the cost of some reduction in availability. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it also triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated.

CSG-AutoSuspendUnauthenticClientAccess-Implementation-Runtime

Access to service Service by client Client has been automatically disabled to prevent authenticated attacks by impersonated clients. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. Activation at runtime requires Service to be managed by a suitable adaptation framework. The Disable Client Access control should be deselected if and when access by Client to Service has been enabled once again.

CSG-AutoSuspendUntrustworthyClientAccess

Access to service Service by client Client may be automatically disabled to prevent authenticated attacks by compromised clients, at the cost of some reduction in availability. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it also triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated.

CSG-AutoSuspendUntrustworthyClientAccess-Implementation-Runtime

Access to service Service by client Client has been automatically disabled to prevent authenticated attacks by compromised clients. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. Activation at runtime requires Service to be managed by a suitable adaptation framework. The Disable Client Access control should be deselected if and when access by Client to Service has been enabled once again.

CSG-ElasticHosting

The (virtual) device Host is operating as a cluster, which allows automatic scaling in the number of instances to meet the load placed upon the host. This must be configured in advance, so it is a blocking strategy not a contingency plan or run-time threat response.

CSG-SLAEnforcement

The use of resources by host Host are limited to the level specified in a service level agreement with the hosting data centre DataCentre.

CSG-SLAEnforcement-Trigger

The use of resources by host Host are limited to the level specified in a service level agreement with the hosting data centre DataCentre.

AutoDataGovernance

The Process is managed by a data governance framework such as Fybrik, which can modify its behaviour without the intervention of a human manager.

AutoProvisioning

Instances of the (virtual) Host can be automatically provisioned to increase capacity to meet loads from hosted processes or other virtual hosts.

SLA

The host is subject to a service level agreement negotiated with its data centre that places limits on how far it can be elastically scaled up to meet demand.

SLAEnforcement

There is a means to enforce capacity limits for the resources allocated to a virtual host.

Role_APIServer

A reverse proxy providing access to virtual host login and admin functions in a cloud data centre.

Role_CloudMaster

An master node in a virtual cluster supporting automated management of services in the cloud.

Role_CloudWorker

An worker node in a virtual cluster supporting automated management of services in the cloud.

Role_ClusterIP

An overlay network connecting nodes in a virtual cluster supporting automated management of services in the cloud.

Role_Container

A virtual host configured to run a service that can be automatically deployed and managed in the cloud.

Role_Ingress

A reverse proxy providing access to services that are deployed and managed automatically in a cloud data centre.

Role_Pod

A cloud deployment context for one or more Containers, modelled as a type of host.

APIServer

A proxy for running commands on a Container within a K8S or Docker platform or equivalent. Behaves like a login service on a bastion server, providing shell access via a front-end system (the K8s Master Node) to login services on the Containers. It is not itself a login service, as it does not provide shell access on its own host. The default trustworthiness levels are set on the assumption that this asset will be subject to penetration testing by the data centre operator before it is used.

ClusterIP

A subnet implemented by K8S using iptables rules to provide connectivity to Pods and Services using networks connecting their hosts.

Container

A simple virtual host containing software needed to support a packaged process, suitable for deployment via Docker or Kubernetes.

Ingress

A proxy for accessing services running in a Container under a K8S or equivalent platform. The default trustworthiness levels are set on the assumption that this asset will be subject to penetration testing by the data centre operator before it is used.

Master

A VM that forms part of a virtual cluster managed by a framework such as Kubernetes, but is used to host control plane functions of the management framework.

Pod

A virtual host containing support for sharing a virtual network and storage services with one or more Containers.

Worker

A CloudWorker represents a virtual cluster of worker nodes, which is allocated and managed via a framework such as Kubernetes.

        (empty)