Requirements of network security situational awareness platform for cloud computing |
|
Network security situational awareness (NSSA) is derived from situational awareness. It usually includes four processes, data acquisition, security situation analysis, security situation assessment and security situational tendency projection, and it generally has the following capabilities: 1) detection and persistent monitoring of various attack threats, abnormal behaviour and their scope of influence; 2) data mining, threat analysis and tracing abnormal behaviour; 3) security prediction and early warning; 4) visualization of the security situation.
For cloud computing service providers, the NSSA platform plays an important role in improving cloud computing's security protection, the ability to detect security breaches or anomalous behaviours, security decision-making and emergency response ability, and it can even help improve the early warning mechanism for cloud computing.
Recommendation ITU-T X.1645 will first introduce the concept and development of NSSA, analyse the advantages of NSSA coping with the security challenges of cloud computing and document the requirements for the NSSA platform for cloud computing.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/15527 |
Series title: |
X series: Data networks, open system communications and security X.1600-X.1699: Cloud computing security X.1640-X.1659: Cloud computing security best practices and guidelines |
Approval date: |
2023-09-08 |
Provisional name: | X.nssa-cc |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
[19 related work items in progress]
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1645 (09/2023)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|