From the course: Threat Modeling: Repudiation in Depth

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Cloud

Cloud

From the course: Threat Modeling: Repudiation in Depth

Start my 1-month free trial

Cloud

- [Narrator] When moving to the cloud means uploading machine images, you get the same logs from the machine you did in your data center, except you don't get the hypervisor logs or their outer logs. In contrast, when you're rearchitecting for the cloud, using more and more of the new technologies offered by the big infrastructure providers, your logs change. And your logs change even more when you move to software as a service. There, the logs you get may not be what you need and logging may not be your provider's top goal. It's important to test your ability to use the logs that you get. You need to simulate predictable situations and repudiations, and discover if the logs are sufficient. Of course, this is not limited to repudiation. But when your customers have a deep stake in the outcome, knowing what's knowable is important.

Contents