SAAS




  IaaS PaaS SaaS Trusted virtual machine images Consideration Compliance to standards Multi-factor Authentication Application Security Scanning Encryption of logs End point Security Measures; Antivirus & IPS Host based Intrusion Detection/Prevention Proper key and log management Login History & Reports from SaaS vendors Mechanism to block and filter information traffic […]

Application Security Checklist Points for IaaS, PaaS, SaaS