ISO/IEC 17789:2014
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology — Cloud computing — Reference architecture
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
22-09-2023
English
10-10-2014
ISO/IEC 17789:2014 specifies the cloud computing reference architecture (CCRA). The reference architecture includes the cloud computing roles, cloud computing activities, and the cloud computing functional components and their relationships.
Committee |
ISO/IEC JTC 1/SC 38
|
DocumentType |
Standard
|
Pages |
53
|
PublisherName |
International Organization for Standardization
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
DS ISO/IEC 17789 : 2014 | Identical |
AS ISO/IEC 17789:2020 | Identical |
DIN ISO/IEC 17789:2017-07 | Identical |
NEN ISO/IEC 17789 : 2014 | Identical |
BS ISO/IEC 17789:2014 | Identical |
SS-ISO/IEC 17789 : 2014 | Identical |
CAN/CSA-ISO/IEC 17789:16 | Identical |
NS ISO/IEC 17789 : 2014 | Identical |
INCITS/ISO/IEC 17789 : 2017 | Identical |
PN ISO/IEC 17789 : 2017 | Identical |
SAC GB/T 32399 : 2015 | Identical |
DIN ISO/IEC 17789:2016-10 (Draft) | Identical |
BS ISO/IEC 19944:2017 | Information technology. Cloud computing. Cloud services and devices: Data flow, data categories and data use |
18/30346433 DC : 0 | BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY |
BS ISO/IEC 19086-1:2016 | Information technology. Cloud computing. Service level agreement (SLA) framework Overview and concepts |
TS 103 532 : 1.1.1 | CYBER; ATTRIBUTE BASED ENCRYPTION FOR ATTRIBUTE BASED ACCESS CONTROL |
ISO/IEC 18384-2:2016 | Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 2: Reference Architecture for SOA Solutions |
ISO/IEC 19086-1:2016 | Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts |
GR NFV 001 : 1.2.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV); USE CASES |
CSA ISO/IEC 27018 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
ISO/IEC 27036-4:2016 | Information technology Security techniques Information security for supplier relationships Part 4: Guidelines for security of cloud services |
BS ISO/IEC 19086-3:2017 | Information technology. Cloud computing. Service level agreement (SLA) framework Core conformance requirements |
ISO/IEC 19944:2017 | Information technology Cloud computing Cloud services and devices: Data flow, data categories and data use |
TR 103 304 : 1.1.1 | CYBER; PERSONALLY IDENTIFIABLE INFORMATION (PII) PROTECTION IN MOBILE AND CLOUD SERVICES |
ISO/IEC 19941:2017 | Information technology — Cloud computing — Interoperability and portability |
ISO/IEC 27017:2015 | Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
16/30336264 DC : 0 | BS ISO/IEC 19086-3 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 3: CORE CONFORMANCE REQUIREMENTS |
18/30348902 DC : 0 | BS ISO/IEC 21878 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY GUIDELINES FOR DESIGN AND IMPLEMENTATION OF VIRTUALIZED SERVERS |
SR 003 392 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; CLOUD COMPUTING STANDARDS MATURITY ASSESSMENT; A NEW SNAPSHOT OF CLOUD COMPUTING STANDARDS |
BS ISO/IEC 27036-4:2016 | Information technology. Security techniques. Information security for supplier relationships Guidelines for security of cloud services |
CAN/CSA-ISO/IEC 27017:16 | Information technology Security techniques Code of practice for information security controls based on ISO/IEC 27002 for cloud services (Adopted ISO/IEC 27017:2015, first edition, 2015-12-15) |
16/30313038 DC : 0 | BS ISO/IEC 19944 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - CLOUD SERVICES AND DEVICES: DATA FLOW, DATA CATEGORIES AND DATA USE |
BS ISO/IEC 27018:2014 | Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
BS ISO/IEC 27017:2015 | Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
ISO/IEC TR 38505-2:2018 | Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management |
GS NFV-REL 005 : 1.1.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV); ACCOUNTABILITY; REPORT ON QUALITY ACCOUNTABILITY FRAMEWORK |
BS ISO/IEC 18384-2:2016 | Information technology. Reference Architecture for Service Oriented Architecture (SOA RA) Reference Architecture for SOA Solutions |
BS ISO/IEC 19941:2017 | Information technology. Cloud computing. Interoperability and portability |
16/30316173 DC : 0 | BS ISO/IEC 19086-1 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS |
13/30266767 DC : 0 | BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
SR 003 391 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
ISO/IEC 19086-3:2017 | Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements |
ISO/IEC TR 20000-9:2015 | Information technology Service management Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services |
17/30313035 DC : 0 | BS ISO/IEC 19941 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - INTEROPERABILITY AND PORTABILITY |
PD ISO/IEC TR 20000-9:2015 | Information technology. Service management Guidance on the application of ISO/IEC 20000-1 to cloud services |
15/30259619 DC : 0 | BS ISO/IEC 27017 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
DIN ISO/IEC 27018:2017-08 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
ISO/IEC 27018:2014 | Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
SR 003 381 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; IDENTIFICATION OF CLOUD USER NEEDS |
CAN/CSA-ISO/IEC 19086-1:18 | Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts (Adopted ISO/IEC 19086-1:2016, first edition, 2016-09-15) |
CEI UNI EN ISO/IEC 23053:2023 | Framework for Artificial Intelligence (AI) Systems Using Machine Learning (ML) |
CAN/CSA-ISO/IEC 27036-4:18 | Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services (Adopted ISO/IEC 27036-4:2016, first edition, 2016-10-01) |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC/IEEE 24765:2017 | Systems and software engineering — Vocabulary |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/IEC 27018:2014 | Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
ISO/IEC/IEEE 42010:2011 | Systems and software engineering — Architecture description |
SA/SNZ TR ISO/IEC 38505.2:2019 | Information technology - Governance of IT - Governance of data Implications of ISO/IEC 38505-1 for data management |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
ISO/IEC 17788:2014 | Information technology — Cloud computing — Overview and vocabulary |
ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.