Advances, Systems and Applications
From: A risk assessment model for selecting cloud service providers
Risk category | Risk name |
---|---|
Policy & Organizational | P1. Lock-in |
 | P2. Loss of governance |
 | P3. Compliance challenges |
 | P4. Loss of business reputation due to co-tenant activities |
 | P5. Cloud service termination or failure |
 | P6. Cloud provider acquisition |
 | P7. Supply chain failure |
Technical | T1. Resource exhaustion (under or over provisioning) |
 | T2. Isolation failure |
 | T3. Cloud provider malicious insider - abuse of high privilege roles |
 | T4. Management interface compromise (manipulation, availability of infrastructure) |
 | T5. Intercepting data in transit |
 | T6. Data leakage on up/download, intra-cloud |
 | T7. Insecure or ineffective deletion of data |
 | T8. Distributed denial of service (DDoS) |
 | T9. Economic denial of service (EDOS) |
 | T10. Loss of encryption keys |
 | T11. Undertaking malicious probes or scans |
 | T12. Compromise service engine |
 | T13. Conflicts between customer hardening procedures and cloud environment |
Legal | L1. Subpoena and e-discovery |
 | L2. Risk from changes of jurisdiction |
 | L3. Data protection risks |
 | L4. Licensing risks |
Not Specific to the Cloud | N1. Network breaks |
 | N2. Network management (ie, network congestion / mis-connection / non-optimal use) |
 | N3. Modifying network traffic |
 | N4. Privilege escalation |
 | N5. Social engineering attacks (ie, impersonation) |
 | N6. Loss or compromise of operational logs |
 | N7. Loss or compromise of security logs (manipulation of forensic investigation) |
 | N8. Backups lost, stolen |
 | N9. Unauthorized access to premises (including physical access to machines and other facilities) |
 | N10. Theft of computer equipment |
 | N11. Natural disasters |