Configuration | ||||
---|---|---|---|---|
Algorithm | Metric | |||
|
|
Pre-Filters | ||||
---|---|---|---|---|
Client | Client, On-Premise | On-premise | On-Premise, CSP | CSP |
Trust Assumptions | |||||
---|---|---|---|---|---|
Malicious Insider (On-premise) | Malicious Insider (CSP) | MitM (Client, On-premise) | MitM (Client, CSP) | MitM (On-premise, CSP) | MatD (Client) |
|
|
|
|
|
|
Scenario Requirements on Goals | ||||||||
---|---|---|---|---|---|---|---|---|
Redundancy |
Scalability |
Reliability |
Maintenance |
DoS Resilience |
Vendor Lock-in |
On-premise Savings |
CSP Savings |
|
Weight | ||||||||
Threshold Penalty |
None Hard Soft |
None Hard Soft |
None Hard Soft |
None Hard Soft |
None Hard Soft |
None Hard Soft |
None Hard Soft |
None Hard Soft |
Scenario Requirements on Protection Levels | ||||||||
---|---|---|---|---|---|---|---|---|
Confidentiality |
Integrity |
Availability |
||||||
Weight | ||||||||
Threshold Penalty |
None Hard Soft |
None Hard Soft |
None Hard Soft |
Best Architectures |
---|