The key underlying vulnerability causing lock-in, as ranked by ENISA, is:
A. Lack of completeness and transparency in terms of use.
Lock-in refers to the situation where a customer becomes dependent on a particular cloud service provider and faces challenges or barriers in migrating to another provider or bringing the services back in-house. ENISA research identifies lock-in as a high-risk factor in cloud computing.
One of the key vulnerabilities that contribute to lock-in is the lack of completeness and transparency in terms of use. This means that the terms and conditions, contractual agreements, and service-level agreements provided by the cloud service provider may not adequately disclose all the relevant information and restrictions that could impact the customer's ability to migrate or switch providers. Without a clear understanding of the terms of use and potential limitations, customers may unintentionally become locked into the services of a specific provider.
All in One Study Guide
User Provisioning Vulnerability
Multiple vulnerabilities are associated with user provisioning in the ENISA document.
Lack of completeness and transparency in terms of use This occurs when the provider's usage policy is unclear or lacks detail.
R.1: Lock-in: Lack of completeness and transparency in Terms of Use
(page 25)
Vulnerabilities
V13. Lack of standard technologies and solutions
V46. Poor provider selection
V47. Lack of supplier redundancy
V31. Lack of completeness and transparency in terms of use
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Brainiac
3 weeks, 5 days agoFATWENTYSIX
1 month, 2 weeks agoJoAsiaGje
2 months ago