Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Recolector de Cienci...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
versions View all 3 versions
addClaim

Arquitectura y diseño de seguridad de aplicaciones en la nube pública

Authors: Díez Huertas, Lucas;

Arquitectura y diseño de seguridad de aplicaciones en la nube pública

Abstract

A causa de la transformació digital de les empreses més l'increment provocat per la inesperada pandèmia del COVID-19, moltes organitzacions s'han plantejat migrar les seves aplicacions desplegades en les seves CPD a entorns de núvol públic i així facilitar l'accés de les seves aplicacions de negoci a tots els seus empleats sense necessitat d'exposar les seves CPD amb baixos nivells de seguretat, i poder així evitar fugides d'informació, que provocarien perdudes de reputació empresarial i en altres casos multes per part dels reguladors. Amb aquest TFM plantejo una forma de treball des del punt de vista de la seguretat de la informació, basat en el govern, arquitectura i disseny de la seguretat obtenint així una metodologia de treball en la qual es recullen requisits de seguretat que han de seguir les aplicacions per a aconseguir uns estàndards de seguretat acceptables i aconseguir que la informació que es troba en les aplicacions desplegades sigui del tipus que sigui estigui protegida i a resguard d'aquells que vulguin obtenir-la utilitzant bretxes de seguretat o fallades provocades pel disseny i desplegament de l'aplicació en qualsevol entorn.

Debido a la transformación digital de las empresas más el incremento provocado por la inesperada pandemia del COVID-19, muchas organizaciones se han planteado migrar sus aplicaciones desplegadas en sus CPD a entornos de nube pública y así facilitar el acceso de sus aplicaciones de negocio a todos sus empleados sin necesidad de exponer sus CPD con bajos niveles de seguridad, y poder así evitar fugas de información, que provocarían perdidas de reputación empresarial y en otros casos multas por parte de los reguladores. Con este TFM planteo una forma de trabajo desde el punto de vista de la seguridad de la información, basado en el gobierno, arquitectura y diseño de la seguridad obteniendo así una metodología de trabajo en la que se recogen requisitos de seguridad que han de seguir las aplicaciones para alcanzar unos estándares de seguridad aceptables y conseguir que la información que se encuentra en las aplicaciones desplegadas sea del tipo que sea esté protegida y a salvo de aquellos que quieran obtenerla utilizando brechas de seguridad o fallos provocados por el diseño y despliegue de la aplicación en cualquier entorno.

Due to the digital transformation of companies plus the increase caused by the unexpected COVID-19 pandemic, many organizations have considered migrating their deployed applications on their CPDs to public cloud environments to facilitate access of their business applications to all their employees without exposing their CPDs with low levels of security, thus avoiding information leaks , which would result in loss of business reputation and in other cases fines by regulators. With this TFM I propose a framework from the point of view of information security, based on government, architecture and security by design, thus obtaining a working methodology that collects security requirements, that must be followed by applications to achieve acceptable security standards and to ensure that the information found in the applications is of the type protected and safe from those you want to get it using security breaches or failures caused by the design and deployment of the application in any environment.

Country
Spain
Related Organizations
Keywords

núvol, govern, Seguridad informática -- TFM, nube, gobierno, government, cloud, Seguretat informàtica -- TFM, seguretat informàtica, Computer security -- TFM, seguridad informática, computer security

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green
Related to Research communities