What are the methods to address risk?
Avoidance
Acceptance
Transference
Mitigation
What are the design requirements related to business requirements analysis?
What are the boundaries of the cloud model?
IaaS
PaaS
SaaS
What are the roles related to layered defenses?
Cloud Provider
Cloud Customer
This cloud role includes:
* strong personal controls, involving background checks and continual monitoring
*technological controls such as encryption, event logging, and access control enforcement
*physical controls related to both the overall campus
governance mechanisms and enforcement, such as strong policies and regular, thorough audits
Cloud Provider
This cloud role includes:
Cloud Customer
What are the ways for securing devices in the datacenter?