|
In this paper, we presented our security assessment model.
The model provides a unified security policy framework based
on inputs drawn from key takeaways from top threats in the
cloud platform, existing cloud best practices/standards such as
Cloud Security Alliance, and implementation techniques to
provide an early detection mechanism using CIS Benchmarks
etc. By using Blockchain technology we demonstrated how
the data provenance related to security aspects is maintained
uniquely in the decentralized network and in a time-stamped
and tamper-evident manner based on consensus among the
relevant stakeholders. We also have shown measurements of
security policy compliance rate and Common Vulnerability
Scoring System severity level. By looking at the security
policy compliance rate and the CVSS severity level one can
deduce the effectiveness of the overall system. This
architecture can be used for cloud environments also. |