BS ISO/IEC 27036-4:2016
Current
The latest, up-to-date edition.
Information technology. Security techniques. Information security for supplier relationships Guidelines for security of cloud services
Hardcopy , PDF
English
31-10-2016
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Structure of this document
5 Key cloud concepts and security threats and risks
6 Information security controls in cloud service
acquisition lifecycle
7 Information security controls in cloud service providers
Annex A (informative) - Information security standards
for cloud providers
Annex B (informative) - Mapping to ISO/IEC 27017
controls
Bibliography
Gives cloud service customers and cloud service providers with guidance on a) gaining visibility into the information security risks associated with the use of cloud services and managing those risks effectively, and b) responding to risks specific to the acquisition or provision of cloud services that can have an information security impact on organizations using these services.
Committee |
IST/33/4
|
DevelopmentNote |
Supersedes 16/30275200 DC. (10/2016)
|
DocumentType |
Standard
|
Pages |
32
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
This document provides cloud service customers and cloud service providers with guidance on gaining visibility into the information security risks associated with the use of cloud services and managing those risks effectively, and responding to risks specific to the acquisition or provision of cloud services that can have an information security impact on organizations using these services. This document does not include business continuity management/resiliency issues involved with the cloud service. ISO/IEC27031 addresses business continuity. This document does not provide guidance on how a cloud service provider should implement, manage and operate information security. Guidance on those can be found in ISO/IEC27002 and ISO/IEC27017 . The scope of this document is to define guidelines supporting the implementation of information security management for the use of cloud services.
Standards | Relationship |
ISO/IEC 27036-4:2016 | Identical |
ISO/IEC 27017:2015 | Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
ISO/IEC 27018:2014 | Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
ISO/IEC 29115:2013 | Information technology — Security techniques — Entity authentication assurance framework |
ISO/IEC 19086-1:2016 | Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts |
ISO/IEC 27036-3:2013 | Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security |
ISO/IEC 27036-1:2014 | Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts |
ISO/IEC 27036-2:2014 | Information technology Security techniques Information security for supplier relationships Part 2: Requirements |
ISO/IEC 17789:2014 | Information technology — Cloud computing — Reference architecture |
ISO/IEC 17788:2014 | Information technology — Cloud computing — Overview and vocabulary |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.