In this chapter, we consider whether the outsourcing of incident management is a viable technological approach that may be transferable to other cloud security management requirements. We review a viable approach to outsourcing incident response management and consider whether this can be applied to other cloud security approaches, starting with the concept of using proper measurement for a cloud security assurance model. We demonstrate how this approach can be applied, not only to the approach under review, but how it may be applied to address other cloud security requirements.
|Name||Lecture Notes in Computer Science|
|Publisher||Springer International Publishing AG|
|Conference||Second International Workshop|
|Period||30/11/15 → 3/12/15|
- incident response