SR 003 391 : 2.1.1
Current
The latest, up-to-date edition.
CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING
Hardcopy , PDF
English
25-04-2016
Intellectual Property Rights
Foreword
Modal verbs terminology
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 Interoperability and Security in Cloud
Computing
5 High-level user scenarios for interoperability
and security
6 Core concepts
7 Standards, certifications and frameworks for
Interoperability and Security
8 Conclusions and recommendations
9 Areas for further study
Annex A - Change History
History
Provides the initial results of the analysis of interoperability and security in Cloud Computing.
Committee |
NTECH
|
DocumentType |
Standard
|
Pages |
40
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
SR 003 392 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; CLOUD COMPUTING STANDARDS MATURITY ASSESSMENT; A NEW SNAPSHOT OF CLOUD COMPUTING STANDARDS |
SR 003 381 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; IDENTIFICATION OF CLOUD USER NEEDS |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC 25010:2011 | Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — System and software quality models |
ISO/IEC 27017:2015 | Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
ISO/IEC 38500:2015 | Information technology — Governance of IT for the organization |
ISO 31000:2009 | Risk management Principles and guidelines |
ISO 22301:2012 | Societal security Business continuity management systems Requirements |
ISO/IEC 27031:2011 | Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity |
ISO/IEC 27006:2015 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems |
ISO/IEC 24760-1:2011 | Information technology Security techniques A framework for identity management Part 1: Terminology and concepts |
SR 003 392 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; CLOUD COMPUTING STANDARDS MATURITY ASSESSMENT; A NEW SNAPSHOT OF CLOUD COMPUTING STANDARDS |
ISO/IEC 27014:2013 | Information technology Security techniques Governance of information security |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/IEC 27018:2014 | Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
ISO/IEC 29115:2013 | Information technology — Security techniques — Entity authentication assurance framework |
SR 003 381 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; IDENTIFICATION OF CLOUD USER NEEDS |
ISO/IEC 19086-1:2016 | Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts |
ISO/IEC 20000-1:2011 | Information technology Service management Part 1: Service management system requirements |
ISO/IEC 17826:2016 | Information technology Cloud Data Management Interface (CDMI) |
ISO/IEC 13888-1:2009 | Information technology Security techniques Non-repudiation Part 1: General |
ISO/IEC 19086-3:2017 | Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements |
ISO/IEC 17203:2017 | Information technology — Open Virtualization Format (OVF) specification |
ISO/IEC 29101:2013 | Information technology Security techniques Privacy architecture framework |
ISO/IEC 19831:2015 | Cloud Infrastructure Management Interface (CIMI) Model and RESTful HTTP-based Protocol An Interface for Managing Cloud Infrastructure |
ISO/IEC 19099:2014 | Information technology — Virtualization Management Specification |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
ISO/IEC 17789:2014 | Information technology — Cloud computing — Reference architecture |
ISO/IEC 17788:2014 | Information technology — Cloud computing — Overview and vocabulary |
ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.