View on GitHub

acctp

Academic Cloud Computing Threat Patterns catalog

/ Home / Catalog /

BA12 Confiscation Of Computer Hardware

Context Compliance manager works with cloud application
Problem Confiscation of computer hardware of cloud provider as a result of subpoena by law-enforcement agencies
Solution  
References R.21: Subpoena and E–Discovery [ENISA]
Type ns:type_ThreatPattern
Victim su:comp_CloudApplication
Aggressor su:comp_ComplianceManager
Aggr. role ns:role_Client
STRIDE ns:STRIDE_Information_Disclosure;
ns:STRIDE_Denial_of_Service
Threat  

/ Home / Catalog /