Cloud computing: From paradigm to operation Foreword Introduction Table of Contents 1. Framework and requirements for cloud computing Information technology – Cloud computing – Overview and vocabulary 1 Scope 2 Normative references 2.1 Identical Recommendations | International Standards 2.2 Paired Recommendations | International Standards 2.3 Additional references 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation | International Standard 4 Abbreviations 5 Conventions 6 Cloud computing overview 6.1 General 6.2 Key characteristics 6.3 Cloud computing roles and activities 6.4 Cloud capabilities types and cloud service categories 6.5 Cloud deployment models 6.6 Cloud computing cross cutting aspects Annex A Cloud service categories Bibliography Cloud computing – Framework and high-level requirements 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 General requirements for cloud computing 7 General requirements for IaaS 8 General requirements for NaaS 9 General requirements for DaaS 10 General requirements for PaaS 11 General requirements for CaaS 12 General requirements for BDaaS 13 General requirements for inter-cloud computing 14 General requirements for end-to-end cloud resource management 15 General requirements for cloud infrastructure 16 General requirements for trusted cloud services 17 Security considerations Appendix I Use cases of cloud computing I.1 Generic use case I.2 IaaS general use case I.3 NaaS general use case I.4 DaaS general use case I.5 PaaS general use case I.6 CaaS general use case I.7 BDaaS general use case I.8 Inter-cloud computing use case I.9 End-to-end cloud resource management use case I.10 Cloud infrastructure use case I.11 Trusted cloud service use case Appendix II Methodology and edition plan of this Recommendation Information technology – Cloud computing – Reference architecture 1 Scope 2 Normative references 2.1 Identical Recommendations | International Standards 2.2 Additional references 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation | International Standard 4 Abbreviations 5 Conventions 6 Cloud computing reference architecture goals and objectives 7 Reference architecture concepts 7.1 CCRA architectural views 7.2 User view of cloud computing 7.2.1 Cloud computing activities 7.2.2 Roles and sub-roles 7.2.3 Parties 7.2.4 Cloud services 7.2.5 Cloud deployment models 7.2.6 Cross-cutting aspects 7.3 Functional view of cloud computing 7.3.1 Functional components 7.3.2 Functional layers 7.3.3 Multi-layer functions 7.4 Relationship between the user view and the functional view 7.5 Relationship of the user view and functional view to cross-cutting aspects 7.6 Implementation view of cloud computing 7.7 Deployment view of cloud computing 8 User view 8.1 Introduction to roles, sub-roles and cloud computing activities 8.2 Cloud service customer 8.2.1 Role 8.2.1.1 CSC:cloud service user 8.2.1.2 CSC:cloud service administrator 8.2.1.3 CSC:cloud service business manager 8.2.1.4 CSC:cloud service integrator 8.2.2 Cloud computing activities 8.2.2.1 Use cloud service 8.2.2.2 Perform service trial 8.2.2.3 Monitor service 8.2.2.4 Administer service security 8.2.2.5 Provide billing and usage reports 8.2.2.6 Handle problem reports 8.2.2.7 Administer tenancies 8.2.2.8 Perform business administration 8.2.2.9 Select and purchase service 8.2.2.10 Request audit report 8.2.2.11 Connect ICT systems to cloud services 8.3 Cloud service provider 8.3.1 Role 8.3.1.1 CSP:cloud service operations manager 8.3.1.2 CSP:cloud service deployment manager 8.3.1.3 CSP:cloud service manager 8.3.1.4 CSP:cloud service business manager 8.3.1.5 CSP:customer support and care representative 8.3.1.6 CSP:inter-cloud provider 8.3.1.7 CSP:cloud service security and risk manager 8.3.1.8 CSP:network provider 8.3.2 Cloud computing activities 8.3.2.1 Prepare systems 8.3.2.2 Monitor and administer services 8.3.2.3 Manage assets and inventory 8.3.2.4 Provide audit data 8.3.2.5 Define environment and processes 8.3.2.6 Define and gather metrics 8.3.2.7 Define deployment steps 8.3.2.8 Provide services 8.3.2.9 Deploy and provision services 8.3.2.10 Perform service level management 8.3.2.11 Manage business plan 8.3.2.12 Manage customer relationships 8.3.2.13 Manage financial processing 8.3.2.14 Handle customer requests 8.3.2.15 Manage peer cloud services 8.3.2.16 Perform peering, federation, intermediation, aggregation and arbitrage 8.3.2.17 Manage security and risks 8.3.2.18 Design and implement service continuity 8.3.2.19 Ensure compliance 8.3.2.20 Provide network connectivity 8.3.2.21 Deliver network services 8.3.2.22 Provide network management services 8.4 Cloud service partner 8.4.1 Role 8.4.1.1 Cloud service developer 8.4.1.2 Cloud auditor 8.4.1.3 Cloud service broker 8.4.2 Cloud computing activities 8.4.2.1 Design, create and maintain service components 8.4.2.2 Compose services 8.4.2.3 Test services 8.4.2.4 Perform audit 8.4.2.5 Report audit results 8.4.2.6 Acquire and assess customers 8.4.2.7 Assess marketplace 8.4.2.8 Set up legal agreement 8.5 Cross-cutting aspects 8.5.1 General 8.5.2 Auditability 8.5.3 Availability 8.5.4 Governance 8.5.5 Interoperability 8.5.6 Maintenance and versioning 8.5.7 Performance 8.5.8 Portability 8.5.9 Protection of personally identifiable information (PII) 8.5.10 Resiliency 8.5.11 Reversibility 8.5.12 Security 8.5.12.1 General 8.5.12.2 Distribution of security responsibilities 8.5.12.3 Cloud service category perspectives 8.5.12.4 Implications of cloud deployment models 8.5.12.5 Data protection strategy and responsibility 8.5.13 Service levels and service level agreements 9 Functional view 9.1 Functional architecture 9.1.1 Layering framework 9.1.1.1 User layer 9.1.1.2 Access layer 9.1.1.3 Service layer 9.1.1.4 Resource layer 9.1.1.5 Multi-layer functions 9.2 Functional components 9.2.1 User layer functional components 9.2.1.1 User function 9.2.1.2 Business function 9.2.1.3 Administrator function 9.2.2 Access layer functional components 9.2.2.1 Access control 9.2.2.2 Service access 9.2.2.3 Business access 9.2.2.4 Administration access 9.2.2.5 Development access 9.2.2.6 Connection management 9.2.3 Services layer functional components 9.2.3.1 Service capabilities 9.2.3.2 Business capabilities 9.2.3.3 Administration capabilities 9.2.3.4 Service orchestration 9.2.4 Resource layer functional components 9.2.4.1 Resource abstraction and control 9.2.4.2 Physical resources 9.2.5 Multi-layer functions 9.2.5.1 Integration functional components 9.2.5.1.1 Security integration 9.2.5.1.2 Monitoring integration 9.2.5.1.3 Service integration 9.2.5.1.4 Peer service integration 9.2.5.2 Security systems functional components 9.2.5.2.1 Authentication and identity management 9.2.5.2.2 Authorization and security policy management 9.2.5.2.3 Encryption management 9.2.5.3 Operational support systems functional components 9.2.5.3.1 Service catalogue 9.2.5.3.2 Provisioning 9.2.5.3.3 Monitoring and reporting 9.2.5.3.4 Service policy management 9.2.5.3.5 Service automation 9.2.5.3.6 Service level management 9.2.5.3.7 Incident and problem management 9.2.5.3.8 Platform and virtualization management 9.2.5.3.9 Peer service management 9.2.5.4 Business support systems components 9.2.5.4.1 Product catalogue 9.2.5.4.2 Account management 9.2.5.4.3 Subscription management 9.2.5.4.4 Billing 9.2.5.4.5 Accounts 9.2.5.5 Development support functional components 9.2.5.5.1 Developer environment 9.2.5.5.2 Build management 9.2.5.5.3 Test management 10 Relationship between the user view and the functional view 10.1 General 10.2 Overview 10.2.1 Service capabilities functional component 10.2.2 Common roles, activities and functional components 10.2.3 Multi-tenancy and isolation Annex A Further details regarding the user view and functional view A.1 The cloud service customer–cloud service provider relationship A.1.1 Functional relationship A.1.2 Business relationship A.1.3 Administration relationship A.2 The provider–peer provider (or "inter-cloud") relationship A.3 The cloud service developer–cloud service provider relationship A.4 The cloud service provider–Auditor relationship A.4.1 Security audit A.4.2 Privacy impact audit A.4.3 Performance audit Bibliography Cloud computing – Overview and functional requirements for data storage federation 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of data storage federation 6.1 Introduction to data storage federation 6.2 Benefits of data storage federation 6.3 Configuration of logical components for data storage federation 6.4 Ecosystem of data storage federation 6.4.1 DSF service customer 6.4.2 DSF service provider 6.4.2.1 Storage federation provider 6.4.2.2 Data manipulation provider 6.4.3 DSF local storage provider 7 Cloud computing based data storage federation system context 7.1 CSP:storage federation provider (CSP:SFP) 7.1.1 Provide virtual storage pool 7.1.2 Provide single virtual volume 7.1.3 Manage storage management metadata 7.1.4 Manage data storage policy 7.2 CSP:data manipulation provider (CSP:DMP) 7.2.1 Manipulate DSF data 7.2.2 Manage data operation metadata 7.2.3 Manage data manipulation policy 8 Functional requirements for data storage federation 8.1 Storage connection requirements 8.2 Data manipulation requirements 8.3 Storage federation requirements 8.4 Metadata and policy management requirements 9 Security considerations Appendix I Use case of data storage federation I.1 Storing a user file dispersedly I.2 Data sharing between customers I.3 Multiple storage types and access mechanisms for data access I.4 Policy-driven provision and management of DSF local storage I.5 Policy-driven provisioning and management of data I.6 Data virtualization CSP:SFP I.7 Efficient data storage management I.8 The data read/write cache and parallel distributed file for performance enhancement I.9 Data storage federation and management I.10 A use case of storage optimization I.11 The use case for data storage federation management I.12 Registration of data storage for federation service Appendix II Comparison analysis between cloud computing and data storage federation Bibliography Cloud computing – Functional requirements for cloud service brokerage 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of cloud service brokerage 6.1 Introduction to cloud service broker 6.2 Introduction to cloud service brokerage 6.3 Service model of cloud service brokerage 6.4 Configuration of cloud service brokerage 6.4.1 Workspace 6.4.2 Product catalogue management 6.4.3 Contract management 6.4.4 Service access management 6.4.5 Service management 7 Functional requirements of cloud service brokerage 7.1 Functional requirements for workspace 7.2 Functional requirements for product catalogue management 7.3 Functional requirements for contract management 7.4 Functional requirements for cloud service access management 7.5 Functional requirements for cloud service management 8 Security considerations Appendix I Use cases of cloud service brokerage Appendix II Relationship between the logical components and the activities of cloud service broker for CSB Bibliography Cloud computing – Functional requirements of physical machine 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of the physical machine 6.1 Introduction to the computing machine 6.2 Introduction to the physical machine 6.3 Types of physical machine 6.3.1 Single processing unit type 6.3.2 Multi-processing unit type 6.4 Virtualization in physical machines 6.4.1 CPU virtualization 6.4.2 Memory virtualization 6.4.3 I/O virtualization 6.5 Scalability of components in the physical machine 6.5.1 Scalability of the processing unit 6.5.2 Scalability of power supply 6.5.3 Scalability of cooling 7 Functional requirements for a physical machine 7.1 Component requirements 7.1.1 Processing unit requirements 7.1.1.1 CPU requirements 7.1.1.2 Memory requirements 7.1.1.3 Storage requirements 7.1.1.4 I/O device requirements 7.1.2 Power supply requirements 7.1.3 Cooling requirements 7.1.4 Enclosure requirements 7.1.5 Interconnect network requirements 7.1.6 Management component requirements 7.2 I/O interface requirements 7.3 Operation requirements 7.4 Scalability requirements 7.5 Security requirements 7.6 Reliability requirement 8 Security considerations Appendix I Comparison between functional requirements and other specifications I.1 Specifications and other SDOs I.1.1 Open Compute Project I.1.2 DMTF I.1.3 SNIA I.1.4 ETSI I.2 Relationship with related specifications from other SDOs Appendix II Use cases of the physical machine for cloud computing Bibliography Cloud computing – Overview and high-level requirements of distributed cloud 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of distributed cloud 6.1 Concept of distributed cloud 6.2 Characteristics of distributed cloud 6.3 Configuration models of distributed cloud 6.4 Deployment considerations of distributed cloud 6.4.1 Infrastructure considerations of distributed cloud 6.4.2 Network considerations of distributed cloud 6.4.3 Service considerations of distributed cloud 6.4.4 Management considerations of distributed cloud 6.4.5 Security considerations of distributed cloud 7 High-level requirements for distributed cloud 7.1 Infrastructure requirements for distributed cloud 7.2 Network requirements for distributed cloud 7.3 Service requirements for distributed cloud 7.4 Management requirements for distributed cloud 7.5 Security requirements for distributed cloud 8 Security considerations related to ITU-T Recommendations Appendix I General use cases for distributed cloud I.1 Use case template I.2 General use case Appendix II Use cases for configuration of distributed cloud II.1 Autonomous cloud service provisioning on distributed cloud II.2 Customer-oriented cloud service provisioning on distributed cloud II.3 Distributed cloud infrastructure and service management II.4 Distributed cloud infrastructure and service provisioning II.5 Hierarchical caching of cloud service images II.6 High mobility support on distributed cloud Appendix III A comparison of distributed cloud with related technology Bibliography Cloud computing infrastructure requirements 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of cloud infrastructure 7 Requirements for processing resources 7.1 Physical machine requirements 7.2 Virtual machine requirements 7.2.1 CPU virtualization 7.2.2 Memory virtualization 7.2.3 Input/Output device virtualization 7.2.4 Network interface virtualization 7.2.5 Duplication of virtual machine 7.2.6 Dynamic migration of virtual machine 7.2.7 Static migration of virtual machine 7.2.8 Management automation 7.3 Software resources provisioning requirements 7.3.1 Automated provisioning and deployment 7.3.2 Unified software resource management 7.4 Time-sensitive services requirements 8 Requirements for networking resources 8.1 General requirements for networking resources 8.2 Access and core transport network 8.3 Intra-datacentre network 8.4 Inter-datacentre network 9 Requirements for storage resources 9.1 Storage space 9.2 Storage interface 9.3 Storage management 9.4 Storage availability 9.5 Data de-duplication 10 Requirements for resources abstraction and control 11 Support of emergency telecommunications 12 Security considerations Appendix I Overview and reference model for storage in a cloud environment I.1 Reference model for cloud storage I.1.1 Infrastructure sub-layer I.1.2 Presenting sub-layer I.1.3 Access sub-layer Appendix II Considerations on resource monitoring II.1 Health monitoring II.2 Performance monitoring II.3 Capacity monitoring II.4 Security and compliance monitoring II.5 Monitoring and metering for charging and billing II.6 Monitoring in support of cloud services Appendix III Power management in cloud infrastructure Appendix IV Considerations on supporting of ETS Bibliography Framework of inter-cloud computing 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Introduction 7 Patterns of inter-cloud 7.1 Inter-cloud peering 7.2 Inter-cloud federation 7.3 Inter-cloud intermediary 8 Overview of inter-cloud computing 8.1 Relationship between intra-cloud and inter-cloud handling of resources 8.2 Overview of inter-cloud federation 8.2.1 Introduction 8.2.2 Primary CSP and secondary CSP 8.2.3 Network connectivity 8.2.4 Interactions in the case of inter-cloud federation 8.3 Overview of inter-cloud intermediary 8.3.1 Introduction 8.3.2 Primary CSP and secondary CSP 8.3.3 Network connectivity 8.3.4 Interactions in the case of inter-cloud intermediary 9 Functional requirements for inter-cloud 9.1 SLA and policy negotiation 9.2 Resource monitoring 9.3 Resource performance estimation and selection 9.4 Resource discovery and reservation 9.5 Resource set-up and activation 9.6 Cloud services switchover and switchback 9.7 Resource release 9.8 CSC information exchange 9.9 Primary CSP role delegation 9.10 Inter-cloud service handling 10 Security considerations Appendix I Use cases from the inter-cloud perspective I.1 SLA mapping in intermediary pattern I.2 Performance guarantee against an abrupt increase in load (offloading) I.3 Performance guarantee regarding delay (optimization for user location) I.4 Guaranteed availability in the event of a disaster or large-scale failure I.5 Service continuity (in the case of service termination of the original CSP) I.6 Market transactions in inter-cloud intermediary pattern Appendix II Use cases from cloud service providers' views II.1 Use case 1 – Cloud service rebranding II.2 Use case 2 – Discovery II.3 Use case 3 – Intermediary II.4 Use case 4 – Platforming II.5 Use case 5 – Offloading II.6 Use case 6 – Virtual data centre expansion II.7 Use case 7 – Distributed media II.8 Use case 8 – Cloud storage expansion II.9 Use case 9 – Service delivery platform components Appendix III Abstract service offering models for inter-cloud computing III.1 Service item expansion III.2 Service operation enhancement III.2.1 CSC-initiated operation and CSP-initiated operation III.3 Consideration on network connectivity Appendix IV Inter-cloud security aspects Bibliography Big data – Cloud computing based requirements and capabilities 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of big data 6.1 Introduction to big data 6.2 Big data ecosystem 6.2.1 Data provider (DP) 6.2.1.1 Data supplier 6.2.1.2 Data broker 6.2.2 Big data service provider (BDSP) 6.2.3 Big data service customer (BDC) 6.3 Relationship between cloud computing and big data 7 Cloud computing based big data 7.1 Cloud computing based big data system context 7.1.1 CSN:data provider (CSN:DP) 7.1.1.1 Generate data activity 7.1.1.2 Publish data activity 7.1.1.3 Brokerage data activity 7.1.2 CSP: big data application provider (CSP:BDAP) 7.1.2.1 Visualize data activity 7.1.2.2 Analyse data activity 7.1.3 CSP:big data infrastructure provider (CSP:BDIP) 7.1.3.1 Perform data collection activity 7.1.3.2 Perform data storage activity 7.1.3.3 Provide data pre-processing activity 7.1.3.4 Provide data integration activity 7.1.3.5 Manage data protection activity 7.1.3.6 Manage data provenance activity 7.1.4 CSC:big data service user (CSC:BDSU) 7.1.4.1 Use big data service 7.2 Benefits of cloud computing based big data 8 Requirements of cloud computing based big data 8.1 Data collection requirements 8.2 Data pre-processing requirements 8.3 Data storage requirements 8.4 Data analysis requirements 8.5 Data visualization requirements 8.6 Data management requirements 8.7 Data security and protection requirements 9 Cloud computing based big data capabilities 9.1 Data collection capabilities 9.2 Data pre-processing capabilities 9.3 Data storage capabilities 9.4 Data analytics capabilities 9.5 Data visualization capabilities 9.6 Data management capabilities 9.7 Data security and protection capabilities 10 Security considerations Appendix I Use cases of cloud computing in support of big data Appendix II Use cases of cloud computing based big data as analysis services Appendix III Mapping of big data ecosystem roles into user view of ITU-T Y.3502 Bibliography Big data standardization roadmap 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Supplement 4 Abbreviations and acronyms 5 Conventions 6 Landscape of big data from an ITU-T perspective 6.1 Characteristics and general concepts of big data 6.2 Benefits of big data 7 Related technical areas of big data 7.1 Cloud computing 7.2 Internet of things 7.3 Security and privacy 7.4 Software-defined networking 7.5 Deep packet inspection 7.6 Big data-driven networking 7.7 Open data 7.8 Standardization areas of big data 8 Conceptual model of big data ecosystem 9 Big data SDO activities 9.1 ITU-T 9.2 ISO/IEC JTC 1 9.3 W3C 9.4 OASIS 9.5 Data Mining Group 9.6 TM Forum 10 Gap analysis in big data standardization Appendix I Summaries of referenced standardization work items I.1 ITU-T references and associated summaries I.2 ISO/IEC JTC 1 References and associated summaries I.3 W3C references and associated summaries I.4 OASIS references and associated summaries I.5 Data Mining Group references and associated summaries I.6 TM Forum references and associated summaries Bibliography Cloud computing standardization roadmap 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Supplement 4 Abbreviations and acronyms 5 Conventions 6 Landscape of cloud computing from ITU-T perspective 7 Overview of cloud computing standard roadmap 7.1 Introduction to standards development organizations (SDOs) for cloud computing 7.1.1 ITU-T SG13 7.1.2 ITU-T SG17 7.1.3 ITU-T SG5 7.1.4 ITU-T SG11 7.1.5 ITU-T SG16 7.1.6 ITU-T SG20 7.1.7 ITU-T SG2 7.1.8 JTC 1 SC 38 (Cloud Computing and Distributed Platforms) 7.1.9 DMTF (Distributed Management Task Force) 7.1.10 TM Forum 7.1.11 ATIS 7.1.12 Broadband Forum 7.2 Analysis of deliverable to provide its category 8 ITU-T SG13 8.1 Q17 8.2 Q18 8.3 Q19 8.4 Analysis of ITU-T SG13 deliverables 9 ITU-T JRG-CCM (Joint Rapporteur Group on Cloud Computing Management) of ITU-T SG13 and ITU-T SG2 10 ITU-T SG17 11 ITU-T SG5 12 ITU-T SG11 13 ITU-T SG16 14 ITU-T SG2 15 ISO/IEC JTC 1 SC 38 16 DMTF 17 TM Forum 18 ATIS 19 Broadband Forum 20 Metro Ethernet Forum Bibliography ITU Technology Watch Report 2. Cloud Computing management Overview of end-to-end cloud computing management 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Introduction 7 Objectives 8 Conceptual view and management layering 8.1 Cloud computing management layering 8.1.1 Customer management layer 8.1.2 Product management layer 8.1.3 Service management layer 8.1.4 Resource management layer 8.2 Service management interface 8.3 Relationship with the cloud computing reference architecture 9 Common model for E2E cloud computing management 10 Cloud computing management functionalities 10.1 Functionalities for cloud customer management 10.1.1 Customer fulfilment functionalities 10.1.1.1 Customer order management 10.1.2 Customer assurance functionalities 10.1.2.1 Customer problem management 10.1.2.2 Customer SLA management 10.1.2.3 Customer quality management 10.1.3 Customer repositories functionalities 10.1.3.1 Customer information management 10.2 Functionalities for cloud product management 10.2.1 Product fulfilment functionalities 10.2.1.1 Product order management 10.2.2 Product assurance functionalities 10.2.2.1 Product problem management 10.2.2.2 Product performance management 10.2.2.3 Product quality management 10.2.2.4 Product test management 10.2.3 Product repositories functionalities 10.2.3.1 Product catalogue management 10.2.3.2 Product inventory management 10.3 Functionalities for cloud service management 10.3.1 Service fulfilment functionalities 10.3.1.1 Service order management 10.3.2 Service assurance functionalities 10.3.2.1 Service problem management 10.3.2.2 Service performance management 10.3.2.3 Service quality management 10.3.2.4 Service test management 10.3.3 Service repositories functionalities 10.3.3.1 Service catalogue management 10.3.3.2 Service inventory management 10.4 Functionalities for cloud computing resource management 10.4.1 Resource fulfilment functionalities 10.4.1.1 Resource order management 10.4.2 Resource assurance functionalities 10.4.2.1 Resource performance management 10.4.2.2 Resource fault management 10.4.2.3 Resource test management 10.4.3 Resource charging and accounting functionalities 10.4.3.1 Resource usage collection and distribution 10.4.4 Resource repositories functionalities 10.4.4.1 Resource catalogue management 10.4.4.2 Resource inventory management 11 Security considerations Annex A Use of SMI-based model across various cloud architecture layers Appendix I Illustration on E2E cloud computing management in practice I.1 Introduction I.2 Vertical vs horizontal management I.3 Orchestrated management actions I.4 Monitoring and diagnostics I.5 Example of E2E cloud computing management Bibliography Cloud-based network management functional architecture 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 3.2.1 cloud-based network management 3.2.2 management service analysis function 3.2.3 management service composing function 3.2.4 management service deployment function 4 Abbreviations and acronyms 5 Conventions 6 Introduction 7 Cloud-based network management functional architecture 7.1 Basic concept 7.2 Detailed structure of cloud-based network management functional architecture 7.2.1 High level layering of cloud-based network management functional architecture 7.2.2 Detailed composition of cloud-based network management functional architecture 7.3 The functions of each part in the architecture 7.4 The relationship between the components in the architecture Requirements for service management in cloud-aware telecommunication management system 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 7 General requirements for service management in cloud-aware telecommunication management system 8 Functional framework for service management in cloud-aware telecommunication management system 9 Functional requirements for service management in cloud-aware telecommunication management system 9.1 Service catalogue management 9.2 Service inventory management 9.3 Service order management 9.4 Service problem management 9.5 Service performance management 9.6 Service test management 9.7 Service quality management 9.8 Service rating/discounting management 10 Security considerations Bibliography Cloud computing framework for end to end resource management 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 End to end cloud resource management overview 6.1 Introduction 6.2 Service delivery management structure 6.3 Difference between cloud computing and the traditional form of computing 6.4 Resource management for a single cloud service provider 6.4.1 Software enabled services 6.5 Resource management for multiple cloud service providers 7 Requirements for the resource management involving multi-cloud service providers 7.1 High-level architecture for end to end multi-cloud resource management 7.2 Functional requirements for end to end cloud resource management 8 Cloud resource management for emergency telecommunications 9 Security considerations Appendix I Comprehensive view of management layers Appendix II Multi-cloud end to end service management Appendix III Summary of SES and SMI concepts III.1 Software enabled service (SES) III.2 Service management interface (SMI) III.3 SMI interface Bibliography End-to-end cloud service lifecycle management requirements 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of E2E cloud service lifecycle management 6.1 Cloud service lifecycle metadata 6.2 Cloud service lifecycle management framework 6.3 Cloud service lifecycle management stages 6.4 Relationship with cloud computing reference architecture 7 E2E cloud service lifecycle management functional requirements 7.1 Service management interface 7.2 Self-service 7.3 Service maintenance 7.4 Reporting 7.5 Composite applications or mash-ups 7.6 Traditional business processes 7.7 Decommissioning 7.8 Policy 7.9 Lifecycle stage management 7.10 Service automation and continuous delivery 7.11 Metadata management 8 Security considerations Appendix I E2E cloud service lifecycle management use cases I.1 Service management interface I.2 Self-service use case I.3 Service maintenance use case I.4 Composite applications or mash-ups use case I.5 Traditional business processes use case I.6 Decommissioning use case I.7 Policy use case I.8 Lifecycle stage management use case I.9 Service automation and continuous delivery use case I.10 Metadata management use case Bibliography Metadata framework for NaaS service lifecycle management 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 General description 7 Metadata in NaaS service 7.1 NaaS service data model 7.2 NaaS service operational policy data model 7.3 NaaS resource data model 7.4 Relationship among metadata in NaaS service 8 Metadata framework for NaaS service lifecycle management 8.1 Metadata of NaaS service in design time 8.2 Metadata of NaaS service in runtime execution time 9 NaaS service operational policy framework 9.1 Elements of NaaS service operational policy 9.1.1 NaaS service operational policy administration point 9.1.2 NaaS service operational policy decision point 9.1.3 NaaS service operational policy information point 9.1.4 NaaS service operational policy enforcement point 9.2 Functions of NaaS service operational policy 9.3 Procedure of NaaS service operational policy from creation to enforcement 10 Security considerations Appendix I Metadata applicability in NaaS service lifecycle management I.1 Virtual private cloud I.2 Instant VPN Bibliography Cloud computing – Functional requirements of inter-cloud data management 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of inter-cloud data management 6.1 Inter-cloud data categorization 6.2 Data policy language 6.3 Inter-cloud data policy-based management 6.4 Relationship with cloud computing reference architecture 7 Functional requirements for inter-cloud data policy 7.1 Data policy language 7.2 Inter-cloud data policy administration point 7.3 Inter-cloud data policy information point 7.4 Inter-cloud data policy decision point 7.5 Inter-cloud data policy enforcement point 7.6 Inter-cloud data policy monitoring 7.7 Inter-cloud dynamic data policy management 7.8 Inter-cloud autonomic data policy management 7.9 Inter-cloud cognitive data policy management 8 Functional requirements for inter-cloud data isolation and protection 8.1 Datasets placement policies among different CSPs 8.2 Data movement regulation across geographical borders 9 Functional requirements for inter-cloud data management 9.1 Inter-cloud data use policies 9.2 Secure data management of the SaaS replication model in inter-cloud 9.3 Secure data management of the SaaS partition model in inter-cloud 9.4 Secure data management of the SaaS data partition model in inter-cloud 10 Security considerations Appendix I Use case of inter-cloud data management I.1 Use case template I.2 Use case of data use policies in inter-cloud I.3 Use case of secure data management of the SaaS replication model in inter-cloud I.4 Use case of secure data management of the SaaS partition model in inter-cloud I.5 Use case of secure data management of the SaaS data partition model in inter-cloud I.6 Use case of data policy language I.7 Use case of CSC data policy implementation in inter-cloud I.8 Use case of data placement policies for data-intensive applications in the inter-cloud environment I.9 Use case of data regulation across different countries in the inter-cloud environment Bibliography 3. XaaS Requirements for desktop as a service 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Convention 6 Introduction to desktop as a service (DaaS) 6.1 Main advantages of DaaS 6.2 General configuration for DaaS 6.3 Interaction between DaaS components 7 DaaS general requirements 8 DaaS functional requirements 8.1 Operation and management requirements 8.2 DaaS platform-side functional requirements 8.3 DaaS client-side functional requirements 8.4 DaaS platform-DaaS client interaction functional requirements 8.5 DaaS security requirements 9 Security considerations Appendix I Relationship between DaaS logical components and the cloud computing reference architecture Appendix II DaaS client classification Appendix III DaaS use cases Appendix IV Value for response time limit Appendix V Service provisioning based on CSC types in DaaS V.1 Types of cloud service customer V.2 User account provisioning based on CSC types in DaaS V.3 Service provisioning in DaaS Bibliography Functional architecture for Desktop as a Service 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Relationship between DaaS logical components and DaaS functions 7 DaaS functions 7.1 Virtualization infrastructure support 7.1.1 Platform virtualization 7.1.2 Resource assignment 7.1.3 Performance enhancement for virtualization platform 7.1.4 Infrastructure access management 7.2 Virtual desktop connection and delivery 7.2.1 Delivery protocol processing 7.2.2 Client connection management 7.2.3 User access management 7.2.4 Provisioning and allocation of virtual desktop 7.3 Virtual desktop resource management 7.3.1 Monitoring and controlling virtual desktop resource 7.3.2 User account and profile management 7.3.3 Virtual desktop resource allocation and distribution 7.3.4 Operational policy management for DaaS 7.3.5 High availability for DaaS 7.3.6 Power management of virtual desktop resource 7.4 Client support 7.4.1 Service connection 7.4.2 Connection negotiation 7.4.3 Client peripheral connection 7.4.4 Service continuity for user environment 7.5 Relationships among DaaS functions 8 Relationships between DaaS functions and functional components of cloud computing reference architecture 9 DaaS functional architecture 9.1 Client support functions 9.1.1 Service connection function 9.1.2 Connection negotiation function 9.1.3 Client peripheral connection function 9.1.4 Service continuity for user environment function 9.2 Virtual desktop connection and delivery functions 9.2.1 Delivery protocol processing function 9.2.2 User access management function 9.2.3 Client connection management function 9.2.4 Provisioning and allocation of virtual desktop function 9.3 Virtual desktop resource management functions 9.3.1 Monitoring and controlling virtual desktop resource 9.3.2 User account and profile management 9.3.3 Virtual desktop resource allocation and distribution 9.3.4 Operational policy management for DaaS 9.3.5 High availability for DaaS 9.3.6 Power management of virtual desktop resource 9.4 Virtualization infrastructure functions 9.4.1 Infrastructure access management function 9.4.2 Performance enhancement for virtualization platform function 9.4.3 Resource assignment function 9.4.4 Platform virtualization function 9.5 Reference points 9.5.1 Reference points between CS-FS and VDCD-FS 9.5.2 Reference points between VDCD-FS and VDRM-FS 9.5.3 Reference points between VDCD-FS and VI-FS 9.5.4 Reference points between VDRM-FS and VI-FS 9.5.5 Reference points within VDCD-FS 9.5.6 Reference points within VDRM-FS 9.5.7 Reference points within VI-FS 10 Security considerations Appendix I Relationship between DaaS logical components and cloud computing reference architecture Appendix II Relationship between DaaS functions and functional components in cloud computing reference architecture Bibliography Cloud computing – Functional requirements of Network as a Service 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 General description 6.1 Networking challenges in cloud computing 6.2 High-level concept of NaaS 7 Functional requirements of NaaS application 7.1 Performance 7.2 Operation and management 7.3 Service chain 7.4 Multiple IP addresses 8 Functional requirements of NaaS platform 8.1 Programmable NaaS platform 8.2 Dynamic and flexible network services composition and steering 8.3 Isolation of service chains for tenants 8.4 Flexible scaling of NaaS platform 8.5 Integration of software applications 9 Functional requirements of NaaS connectivity 9.1 Common control mechanism for NaaS connectivity 9.2 Unified SLA for multiple optimized networks 9.3 Leveraging transport networks dynamically 9.4 Unified network control mechanism 9.5 Elastic network reconfiguration 9.6 Seamless and end-to-end solution of bandwidth allocation 9.7 Symmetric or asymmetric capacity 9.8 Optimized and fine-grained traffic engineering 9.9 Coexistence with legacy network services and functions 9.10 Centralized control view and abstraction view of resources 9.11 CSC limited control of services 9.12 Logically isolated network partition 9.13 Overlay network mechanism 9.14 Overlapped private IP addresses 9.15 Interworking among different VPN solutions 9.16 VPN connection in mobile environment 9.17 Connection to NaaS CSP's network through public Internet 10 Security considerations Appendix I Development methodology of NaaS functional requirements and architecture Appendix II Use cases of NaaS II.1 Use case template II.2 NaaS applications related use cases II.2.1 General use cases II.2.1.1 General NaaS application use case II.2.1.2 NaaS application use case for application provision II.2.2 Detailed use cases II.2.2.1 NaaS platform use case for cloud CDN II.3 NaaS platform related use cases II.3.1 General use cases II.3.2 Detailed use cases II.3.2.1 NaaS platform use case for service chain II.3.2.2 NaaS platform use case for platform provision II.4 NaaS connectivity related use cases II.4.1 General use cases II.4.1.1 General NaaS connectivity use case II.4.2 Detailed use cases II.4.2.1 NaaS connectivity use case for dynamic transport network II.4.2.2 NaaS connectivity use case for flexible and extended VPN II.4.2.3 NaaS connectivity use case for BoD service II.4.2.4 NaaS connectivity use case for optimized traffic engineering II.4.2.5 NaaS connectivity use case for performance on demand II.4.2.6 NaaS connectivity use case for virtual router II.4.2.7 NaaS connectivity use case for private IP addresses and VPNs Appendix III Considerations on CSP's network related activities Bibliography Cloud computing – Functional requirements of Infrastructure as a Service 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 General description 7 Functional requirements 7.1 Computing service functional requirements 7.1.1 Physical machine 7.1.2 Virtual machine 7.1.3 VM migration 7.1.4 VM scaling 7.1.5 VM snapshot 7.1.6 VM clone 7.1.7 VM backup 7.1.8 VM time synchronization 7.1.9 VM reservation 7.1.10 VM image 7.1.11 VM template 7.2 Storage service functional requirements 7.2.1 Storage migration 7.2.2 Storage snapshot 7.2.3 Storage backup 7.2.4 I/O performance 7.2.5 Storage resource reservation 7.3 Network service functional requirements 7.3.1 Network policy migration 7.3.2 Network QoS 7.3.3 IP address 7.3.4 Network isolation 7.3.5 Virtual networking 7.3.6 Load balance 7.3.7 Firewall 7.3.8 Gateway 7.3.9 Network configuration 8 Security considerations Appendix I Use case of Infrastructure as a Service I.1 Use case template I.2 IaaS use case on infrastructure level I.3 IaaS computing service use case I.3.1 VM snapshot use case I.3.2 VM clone use case I.3.3 VM backup use case I.4 IaaS storage service use case I.5 IaaS network service use case Appendix II Methodology of mapping use cases and requirements Bibliography Cloud computing – Functional architecture of Network as a Service 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of NaaS functional architecture 6.1 Key NaaS characteristics 6.2 NaaS CSC activities 6.3 Virtualization of network functions 7 Functionalities for NaaS 7.1 NaaS business related functionalities 7.2 Functionalities for NaaS service instantiation 7.2.1 Description of NaaS service instantiation 7.2.2 Modelling for NaaS service instantiation 7.3 Functionalities for NaaS service orchestration 7.4 Functionalities for network analytics 7.5 Autonomic functionalities 7.6 Policy related functionalities 7.7 NaaS resource functionalities 7.7.1 Functionalities for mapping between physical resources and virtualized networks 7.8 Functionalities for an evolved real-time OSS 7.8.1 Service management layer functionalities 7.8.2 Resource management layer functionalities 7.8.2.1 OSS-network services 7.8.2.2 OSS-network functions 7.8.2.3 OSS-cloud compute and storage 7.8.2.4 OSS-network connectivity 7.8.2.5 OSS-physical resources 7.9 Functionalities for the development of NaaS products and NaaS services 8 Functional components 8.1 Business support system functional components for NaaS products 8.2 Service layer functional components for NaaS 8.2.1 Business capabilities (NaaS) 8.2.2 Administration capabilities (NaaS) 8.2.3 Service capabilities (NaaS) 8.3 OSS functional components 8.3.1 OSS-NaaS functional components 8.3.2 OSS-NS functional components 8.3.2.1 NS catalogue 8.3.2.2 NS provisioning 8.3.2.3 NS monitoring and reporting 8.3.2.4 NS policy management 8.3.2.5 NS automation 8.3.2.6 NS level management 8.3.2.7 NS incident and problem management 8.3.2.8 NS inventory 8.3.3 OSS-NF functional components 8.3.3.1 NF catalogue 8.3.3.2 NF provisioning 8.3.3.3 NF monitoring and reporting 8.3.3.4 NF policy management 8.3.3.5 NF automation 8.3.3.6 NF level management 8.3.3.7 NF incident and problem management 8.3.3.8 NF inventory 8.3.4 OSS-CCS functional components 8.3.4.1 CCS automation 8.3.4.2 CCS monitoring and reporting 8.3.4.3 CCS policy management 8.3.4.4 CCS service level management 8.3.4.5 CCS incident and problem management 8.3.4.6 Virtualization management 8.3.4.7 CCS virtual resource inventory 8.3.4.8 Software image management 8.3.5 OSS-NC functional components 8.3.5.1 NC application catalogue 8.3.5.2 NC application provisioning 8.3.5.3 NC automation 8.3.5.4 NC monitoring and reporting 8.3.5.5 NC policy management 8.3.5.6 NC service level management 8.3.5.7 NC incident and problem management 8.3.5.8 NC inventory 8.3.6 OSS functional components for physical resources 8.4 Functional components for NaaS development support 9 Security considerations Annex A OSS reference points Annex B Functional components on mapping between physical and virtualized networks B.1 Physical network B.2 Virtualized network B.3 Physical-virtualized-networks mapping Appendix I Mapping among NaaS functional requirements and functionalities I.1 Mapping and derivation of functionality for NaaS service instantiation I.2 Mapping and derivation of functionality for service orchestration I.3 Mapping and derivation of functionalities for network analytics, policy, and autonomy I.4 Mapping and derivation of functionality for mapping between physical and virtualized networks I.5 Mapping and derivation of functionalities for an evolved real-time OSS I.6 Mapping and derivation of functionalities for NaaS products and NaaS services development I.7 Mapping and derivation of functionalities related to NaaS business Appendix II Modelling usage example of NaaS service, NaaS service operational policy and NaaS resource model II.1 Introduction II.2 Modelling usage Appendix III Relationship between NaaS functional architecture and SDN Appendix IV Example of NFV and SDN usage in support of NaaS architecture Bibliography Cloud computing – Functional architecture of big data as a service 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of BDaaS functional architecture 6.1 Framework of BDaaS functional architecture 6.1.1 User view for BDaaS architecture 6.1.2 Functional view for BDaaS 6.1.3 Cross-cutting aspects for BDaaS 6.2 Relationship between user view and functional view 7 Functional architecture for BDaaS 7.1 Service layer functional components 7.1.1 Data collection functional component 7.1.2 Data visualization functional component 7.1.3 Data pre-processing functional component 7.1.4 Data analysis functional component 7.1.5 Data storage functional component 7.2 Resource layer functional components 7.2.1 Distributed processing functional component 7.3 Multi-layer functional components 7.3.1 Integration functional components 7.3.1.1 Third-party service integration functional component 7.3.2 Security systems functional components 7.3.2.1 Security and privacy management functional component 7.3.3 Operational support systems functional components 7.3.3.1 Data life-cycle monitoring functional component 7.3.3.2 Data policy management functional component 7.3.3.3 Data catalogue functional component 7.3.3.4 Resource orchestration functional component for big data 8 Cross-cutting aspects for BDaaS 8.1 Data redundancy 8.2 Performance 9 Security considerations Appendix I Mapping between requirements, activities and functional components Bibliography Security requirements for software as a service application environments 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 7 Maturity levels of SaaS application 7.1 Level 1: Custom SaaS application 7.2 Level 2: Configurable SaaS application 7.3 Level 3: Multi-tenant SaaS application 7.4 Level 4: Scalable SaaS application 8 Security requirements for SaaS application environment 8.1 Common security requirements 8.1.1 Identity and access management (IAM) 8.1.1.1 Identity management (IdM) 8.1.1.2 Trust model 8.1.1.3 Access management 8.1.2 Interface security 8.1.3 Data security 8.1.3.1 Data isolation 8.1.3.2 Data confidentiality 8.1.3.3 Data integrity 8.1.3.4 Data reliability 8.1.3.5 Data traceability and control 8.1.4 Security assessment and audit 8.1.5 Security hardening 8.2 Security requirements of CSP 8.2.1 Availability 8.2.2 Service interoperability/portability guarantee 8.2.3 Software assets protection 8.2.4 Legal compliance 8.2.5 Security verification for source codes 8.3 Security requirements of CSN 8.3.1 Audit security 8.3.2 Software security 8.3.3 Software maintainability Bibliography 4. Video processing and storage Requirements for cloud storage in visual surveillance 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 7 Scenarios 7.1 Video stream storage 7.2 Video file uploading 7.3 Video metadata management 7.4 Picture storage 8 Requirements for cloud storage in visual surveillance 8.1 User requirements 8.1.1 Cloud storage service consumer requirements 8.1.2 Cloud storage service provider requirements 8.2 Service requirements 8.2.1 Video storage service requirements 8.2.2 Picture storage service requirements 8.2.3 Video metadata storage service requirements 8.3 Security requirements 8.3.1 Authentication security requirements 8.3.2 Access security requirements 8.3.3 Content security requirements 8.3.4 System security requirements 8.4 Management requirements 8.4.1 Storage management requirements 8.4.2 Equipment management requirements 8.4.3 Service management requirements 8.4.4 Data management requirements 8.4.5 System management requirements 8.4.6 Operation management requirements 8.5 Scalability requirements 8.6 Reliability requirements 8.7 Performance requirements Bibliography Requirements for a cloud computing platform supporting a visual surveillance system 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Scenarios 6.1 Video distribution 6.2 Video transcoding 6.3 Online intelligent video processing 6.3.1 Case 1: Traffic flow analysis 6.3.2 Case 2: Perimeter prevention 6.4 Offline intelligent video processing 6.4.1 Case 1: Human recognition 6.4.2 Case 2: Video synopsis 7 Requirements for cloud computing platform supporting visual surveillance 7.1 User requirements 7.1.1 Cloud computing service consumer requirements 7.1.2 Cloud computing service provider requirements 7.2 Service requirements 7.2.1 Online intelligent video processing service requirements 7.2.2 Offline intelligent video processing service requirements 7.2.3 Video transcoding 7.3 Security requirements 7.3.1 Authentication security requirements 7.3.2 Access security requirements 7.3.3 Content security requirements 7.3.4 System security requirements 7.4 Management requirements 7.4.1 Resources management requirements 7.4.2 Equipment management requirements 7.4.3 Service management requirements 7.4.4 System management requirements 7.4.5 Operation management requirements 7.5 Scalability requirements 7.6 Reliability requirements 7.7 Performance requirements Bibliography Architecture for cloud storage in visual surveillance 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of cloud storage in visual surveillance 7 Functional architecture for cloud storage in visual surveillance 7.1 Architectural framework 7.2 Functional entities 7.2.1 Cloud storage management unit 7.2.2 Cloud storage data unit 7.2.3 Cloud storage access unit 7.3 Reference points 7.3.1 Reference point Pcs: PU-CSAU 7.3.2 Reference point Mdc: MDU-CSAU 7.3.3 Reference point Ss: CSAU-SCU 7.3.4 Reference point Cms: CMU-CSMU 7.3.5 Reference point Csm: CSMU-CSAU 7.3.6 Reference point Csd: CSMU-CSDU 7.3.7 Reference point Csd': CSMU-CSDU 7.3.8 Reference point Csc: CSDU-CSAU 7.3.9 Reference point Cc: CSDU-CSAU 7.3.10 Reference point Csa: CSMU-CSAU 7.4 Service control flow 7.4.1 Real-time media storage 7.4.2 Video file storage 7.4.3 Image storage 7.4.4 Video metadata or image metadata storage 7.4.5 Media acquisition from the cloud storage system 5. Intercloud and interoperability Cloud computing – Trusted inter-cloud computing framework and requirements 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of trusted inter-cloud 6.1 Governance of trusted inter-cloud 6.2 Management of trusted inter-cloud 6.3 Resiliency of trusted inter-cloud 6.4 Security and confidentiality of trusted inter-cloud 6.5 Relationship between trusted inter-cloud and the cloud computing reference architecture 7 General requirements for trusted inter-cloud 7.1 Data separation 7.2 Data annotation 7.3 Confidentiality of data 7.4 Operational statistics 7.5 Interoperability and dependability 7.6 Master service agreement 8 Requirements for governance of trusted inter-cloud 8.1 Geographical policies 8.2 Governance policies 8.3 Governance roles 8.4 Regulatory policies 8.5 Laws and regulations 9 Requirements for management of trusted inter-cloud 9.1 Management policies 9.2 Management roles 9.3 Distributed data 9.4 Identity management 9.5 Access management 9.6 Policy language 10 Requirements for resiliency of trusted inter-cloud 10.1 Service monitoring 10.2 Service continuity 10.3 Resiliency policies 10.4 Resiliency validation 11 Requirements for security and confidentiality of trusted inter-cloud 11.1 Security and confidentiality policies 11.2 Level of robustness 11.3 Security policy negotiation 11.4 Security and confidentiality policy 11.5 Data security 11.6 Security policy monitoring 12 Security considerations Appendix I Use case of trusted inter-cloud computing I.1 Use case template I.2 Trusted inter-cloud related use cases I.2.1 Use case of access security in trusted inter-cloud I.2.2 Use case of geographical policy in trusted inter-cloud I.2.3 Use case of video gaming in trusted inter-cloud I.2.4 Use case of distributed image processing platform in trusted inter-cloud I.2.5 Use case of distributed information exchange system in trusted inter-cloud I.2.6 Use case of virtual home gateway in trusted inter-cloud I.2.7 Use case of distributed document exchange system in trusted inter-cloud Bibliography Cloud computing – Functional architecture of inter-cloud computing 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 6.1 Inter-cloud functional architecture with different patterns 6.2 Relationship with cloud computing reference architecture 7 Functions of inter-cloud computing 7.1 Business support systems 7.1.1 Service subscription management 7.1.2 Billing 7.2 Operational support systems 7.2.1 Service catalogue 7.2.2 Service provisioning 7.2.3 Monitoring and reporting 7.2.4 Service policy management 7.2.5 Service automation 7.2.6 Service level management 7.2.7 Incident and problem management 7.2.8 Peer service management 7.3 Peer service integration 7.3.1 Peer CSP management 7.3.2 Inter-cloud service negotiation 7.3.3 Inter-cloud service discovery 7.3.4 Inter-cloud service selection 7.3.5 Inter-cloud service reservation 7.3.6 Inter-cloud service release 7.3.7 Inter-cloud capabilities adaptation 7.4 Security systems 7.4.1 Authentication and identity management 7.4.2 Authorization and security policy management 7.4.3 Encryption management 8 Functional components of inter-cloud 9 Security considerations Appendix I Mapping of inter-cloud computing functional requirements and functions Appendix II Reference points of inter-cloud computing II.1 Reference point: I-SSM-Blg II.2 Reference point: I-SSM-IPM II.3 Reference point: I-SSM-MR II.4 Reference point: I-SSM-SC II.5 Reference point: I-SSM-PSM II.6 Reference point: I-Blg-IPM II.7 Reference point: I-Blg-MR II.8 Reference point: I-Blg-SC II.9 Reference point: I-Blg-SP II.10 Reference point: I-Blg-SA II.11 Reference point: I-Blg-SPM II.12 Reference point: I-Blg-SLM II.13 Reference point: I-Blg-PSM II.14 Reference point: I-SP-SC II.15 Reference point: I-SLM-SC II.16 Reference point: I-PSM-SC II.17 Reference point: I-SC-PSI II.18 Reference point: I-SPM-SP II.19 Reference point: I-SP-SA II.20 Reference point: I-PSM-SP II.21 Reference point: I-MR-SP II.22 Reference point: I-PSM-SA II.23 Reference point: I-SA-SPM II.24 Reference point: I-SA-PSI II.25 Reference point: I-PSM-SPM II.26 Reference point: I-SPM-PSI II.27 Reference point: I-SPM-ASPM II.28 Reference point: I-SLM-IPM II.29 Reference point: I-PSM-SLM II.30 Reference point: I-MR-SLM II.31 Reference point: I-SLM-PSI II.32 Reference point: I-MR-IPM II.33 Reference point: I-PSM-MR II.34 Reference point: I-MR-PSI II.35 Reference point: I-PSM-IPM II.36 Reference point: I-IPM-PSI II.37 Reference point: I-PSM-AIM II.38 Reference point: I-PSM-EM II.39 Reference point: I-PSM-BA II.40 Reference point: I-PSM-AA II.41 Reference point: I-PSI-AIM II.42 Reference point: I-PSI-ASPM II.43 Reference point: I-PSI-EM II.44 Reference point: I-PSI-SA Bibliography Cloud computing – Overview of inter-cloud trust management 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of inter-cloud trust management 6.1 Isolation and security management mechanism 6.2 Inter-cloud trust management model 6.3 Reputation-based trust management in inter-cloud environment 6.4 Cloud service evaluation framework 6.5 Relationship with cloud computing reference architecture 7 Requirements for inter-cloud trust management 7.1 Inter-cloud trust policies and credentials 7.2 Inter-cloud reputation scoring 7.3 Inter-cloud reputation-based trust evaluation 7.4 SSO authentication 7.5 Periodical verification 7.6 Control privilege for VM and data 8 Security considerations Appendix I Use case of inter-cloud trust management I.1 Use case template I.2 Use case of trusted network function virtualization I.3 Use case of selecting CSP by reputation-based trust evaluation I.4 Use case of SSO authentication within inter-cloud environment I.5 Use case of control privilege of inter-cloud Appendix II Functionalities for managing isolation and security mechanism II.1 Functionalities for managing isolation and security mechanism Bibliography The framework and overview of cloud computing interoperability testing 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Overview of cloud computing interoperability testing 5.1 Common aspects to be considered in cloud computing interoperability testing 5.2 Infrastructure capabilities type interoperability testing 5.3 Platform capabilities type interoperability testing 5.4 Application capabilities type interoperability testing 6 Cloud computing interoperability testing between CSC and CSP 7 Cloud computing interoperability testing between CSP and CSP 8 Cloud computing interoperability testing between CSP and its management system Appendix I Cloud interoperability testing scenarios Bibliography Cloud computing infrastructure capabilities interoperability testing – part 1: Interoperability testing between the CSC and CSP 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview of cloud computing infrastructure capabilities type interoperability testing between the CSC and CSP 7 Computing service interoperability testing between the CSC and CSP 7.1 Interoperability testing of VM configuration between the CSC and CSP 7.2 Interoperability testing of VM migration between the CSC and CSP 7.3 Interoperability testing of VM snapshot between the CSC and CSP 7.4 Interoperability testing of VM clone between the CSC and CSP 7.5 Interoperability testing of VM time synchronization between the CSC and CSP 7.6 Interoperability testing of VM reservation between the CSC and CSP 7.7 Interoperability testing of VM image between the CSC and CSP 7.8 Interoperability testing of VM template between the CSC and CSP 7.9 Interoperability testing of VM scaling between the CSC and CSP 7.10 Interoperability testing of VM backup between the CSC and CSP 7.11 Interoperability testing of VM life cycle management between the CSC and CSP 7.12 Interoperability testing of physical machine life cycle management between the CSC and CSP 7.13 Interoperability testing of VM configuration inquiring between the CSC and CSP 7.14 Interoperability testing of physical machine configuration inquiring between the CSC and CSP 8 Storage service interoperability testing between the CSC and CSP 8.1 Interoperability testing of storage migration between the CSC and CSP 8.2 Interoperability testing of storage snapshot between the CSC and CSP 8.3 Interoperability testing of storage backup between the CSC and CSP 8.4 Interoperability testing of storage resource reservation between the CSC and CSP 8.5 Interoperability testing of I/O performance between the CSC and CSP 8.6 Interoperability testing of storage life cycle management between the CSC and CSP 8.7 Interoperability testing of storage utilization status inquiring between the CSC and CSP 9 Network service interoperability testing between the CSC and CSP 9.1 Interoperability testing of network policy migration between the CSC and CSP 9.2 Interoperability testing of network QoS between the CSC and CSP 9.3 Interoperability testing of network address translation between the CSC and CSP 9.4 Interoperability testing of network isolation between the CSC and CSP 9.5 Interoperability testing of IP address allocation between the CSC and CSP 9.6 Interoperability testing of IP address reservation between the CSC and CSP 9.7 Interoperability testing of load balance between the CSC and CSP 9.8 Interoperability testing of firewall between the CSC and CSP 9.9 Interoperability testing of multipath routing between the CSC and CSP 9.10 Interoperability testing of network information inquiring between the CSC and CSP Appendix I Test case template Appendix II Test cases for cloud computing infrastructure capabilities interoperability testing between the CSC and CSP II.1 Test cases for computing service interoperability testing between the CSC and CSP II.1.1 Test case: VM configuration II.1.2 Test case: VM migration II.1.3 Test case: VM snapshot II.1.4 Test case: VM clone II.1.5 Test case: VM time synchronization II.1.6 Test case: VM reservation II.1.7 Test case: VM image II.1.8 Test case: VM template II.1.9 Test case: VM scaling II.1.10 Test case: VM backup II.1.11 Test case: VM life cycle management II.1.12 Test case: physical machine life cycle management II.1.13 Test case: VM configuration inquiring II.1.14 Test case: physical machine configuration inquiring II.2 Test cases for storage service interoperability testing between the CSC and CSP II.2.1 Test case: storage migration II.2.2 Test case: storage snapshot II.2.3 Test case: storage backup II.2.4 Test case: storage resource reservation II.2.5 Test case: I/O performance II.2.6 Test case: storage life cycle management II.2.7 Test case: storage utilization status inquiring II.3 Test cases for network service interoperability testing between the CSC and CSP II.3.1 Test case: network policy migration II.3.2 Test case: network QoS II.3.3 Test case: network address translation II.3.4 Test case: network isolation II.3.5 Test case: IP address allocation II.3.6 Test case: IP address reservation II.3.7 Test case: load balance II.3.8 Test case: firewall II.3.9 Test case: multipath routing II.3.10 Test case: network information inquiring Appendix III Alignment analysis with [ITU-T Y.3513] Bibliography Cloud computing interoperability activities 1 Scope 2 References 3 Abbreviations and acronyms 4 Introduction 5 Existing cloud computing interoperability activities 5.1 Standards development organizations for cloud computing interoperability 5.1.1 DMTF 5.1.2 ETSI 5.1.3 GICTF 5.1.4 IEEE 5.1.5 IETF 5.1.6 ISO/IEC JTC1 5.1.7 ITU-T 5.1.8 NIST 5.1.9 OASIS 5.1.10 ODCA 5.1.11 OGF 5.1.12 SNIA 5.1.13 TM Forum 5.2 Testing groups, open sources and tools for cloud computing testing 5.2.1 Testing groups 5.2.2 Open sources 5.2.3 Tools 5.3 Cloud security standardization activities 6 Potential interoperability testing areas of cloud computing Appendix I Summaries of referenced documents I.1 3CPP references and associated summaries I.2 CSMIC references and associated summaries I.3 DMTF references and associated summaries I.4 ETSI references and associated summaries I.5 GICTF references and associated summaries I.6 IEEE references and associated summaries I.7 IETF references and associated summaries I.8 ISO/IEC JTC 1 references and associated summaries I.9 NIST references and associated summaries I.10 OASIS references and associated summaries I.11 ODCA references and associated summaries I.12 OGF references and associated summaries I.13 SNIA references and associated summaries I.14 TMF references and associated summaries I.15 ITU-T draft Recommendation 6. Monitoring Set of parameters of cloud computing for monitoring 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Functional reference architecture of cloud computing 7 Monitoring parameters 7.1 Resource layer parameters 7.1.1 Physical computing resources 7.1.2 Virtual computing resources 7.1.3 Virtual machine operation and control 7.1.4 Network 7.1.5 Software-defined networking 7.1.5.1 Software-defined networking-based network 7.1.5.2 Service chain 7.1.6 Energy consumption 7.1.7 Environment 7.2 Service layer parameters 7.2.1 General 7.2.2 Service availability 7.2.3 Service performance 7.2.3.1 Transaction process 7.2.3.2 Load balance 7.2.3.3 Database 7.2.3.4 Web service performance 7.3 Access layer parameters 7. Security Security framework for cloud computing 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 7 Security threats for cloud computing 7.1 Security threats for cloud service customers (CSCs) 7.1.1 Data loss and leakage 7.1.2 Insecure service access 7.1.3 Insider threats 7.2 Security threats for cloud service providers (CSPs) 7.2.1 Unauthorized administration access 7.2.2 Insider threats 8 Security challenges for cloud computing 8.1 Security challenges for cloud service customers (CSCs) 8.1.1 Ambiguity in responsibility 8.1.2 Loss of trust 8.1.3 Loss of governance 8.1.4 Loss of confidentiality 8.1.5 Service unavailability 8.1.6 Cloud service provider lock-in 8.1.7 Misappropriation of intellectual property 8.1.8 Loss of software integrity 8.2 Security challenges for cloud service providers (CSPs) 8.2.1 Ambiguity in responsibility 8.2.2 Shared environment 8.2.3 Inconsistency and conflict of protection mechanisms 8.2.4 Jurisdictional conflict 8.2.5 Evolutionary risks 8.2.6 Bad migration and integration 8.2.7 Business discontinuity 8.2.8 Cloud service partner lock-in 8.2.9 Supply chain vulnerability 8.2.10 Software dependencies 8.3 Security challenges for cloud service partners (CSNs) 8.3.1 Ambiguity in responsibility 8.3.2 Misappropriation of intellectual property 8.3.3 Loss of software integrity 9 Cloud computing security capabilities 9.1 Trust model 9.2 Identity and access management (IAM), authentication, authorization and transaction audit 9.3 Physical security 9.4 Interface security 9.5 Computing virtualization security 9.6 Network security 9.7 Data isolation, protection and confidentiality protection 9.8 Security coordination 9.9 Operational security 9.10 Incident management 9.11 Disaster recovery 9.12 Service security assessment and audit 9.13 Interoperability, portability and reversibility 9.14 Supply chain security 10 Framework methodology Appendix I Mapping of cloud computing security threats and challenges to security capabilities Bibliography Data security requirements for the monitoring service of cloud computing 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 7 Scope of monitoring data for cloud computing 8 Monitoring data lifecycle in cloud computing 8.1 Monitoring data collection 8.2 Monitoring data storage 8.3 Monitoring data use 8.4 Monitoring data migration 8.5 Monitoring data analysis 8.6 Monitoring data presentation 8.7 Monitoring data destruction 8.8 Monitoring data backup 9 Security threats and challenges for monitoring data of cloud computing 9.1 Security threats and challenges in monitoring data collection stage 9.2 Security threats and challenges in monitoring data storage stage 9.3 Security threats and challenges in monitoring data use stage 9.4 Security threats and challenges in monitoring data migration stage 9.5 Security threats and challenges in monitoring data analysis stage 9.6 Security threats and challenges in monitoring data presentation stage 9.7 Security threats and challenges in monitoring data destruction stage 9.8 Security threats and challenges in monitoring data backup stage 10 Security requirements for monitoring data of cloud computing 10.1 Security requirements for monitoring data collection 10.2 Security requirements for monitoring data storage 10.3 Security requirements for monitoring data use 10.4 Security requirements for monitoring data migration 10.5 Security requirements for monitoring data analysis 10.6 Security requirements for monitoring data presentation 10.7 Security requirements for monitoring data destruction 10.8 Security requirements for monitoring data backup Bibliography Guidelines for cloud service customer data security 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 6.1 Specification of the data in this Recommendation 6.2 Data security threats for cloud service customers 6.3 Existing requirements related to about data security 6.4 Data security lifecycle 7 Guidelines for security controls related to data security 7.1 Security controls in create stage 7.2 Security controls in transmit stage 7.3 Security controls in storage stage 7.4 Security controls in use stage 7.5 Security controls in migrate stage 7.6 Security controls in destroy stage 7.7 Security controls in backup and restore stage Appendix I Guidelines for using security controls Bibliography Guidelines for the operational security of cloud computing 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 7 Requirements of the security clause of the service level agreement 7.1 Security responsibility between CSPs and CSCs 7.2 Requirements of the security clause of SLA 7.2.1 General requirements 7.2.2 Elements of the security clause of SLA 7.2.2.1 Business continuity 7.2.2.2 Data security protection 7.2.2.3 Emergency response 7.2.2.4 Security measures 7.2.2.5 Security audit 7.2.2.6 Security monitoring for improving SLA 7.2.2.7 Security certification 7.2.2.8 Security activity documentation 8 Guidelines of daily operational security 8.1 Identity management and access control 8.1.1 Identity management 8.1.2 Access control management 8.2 Data encryption and key management 8.3 System security monitoring 8.4 Disaster recovery 8.5 Security configuration management 8.6 Security event processing 8.6.1 Detecting 8.6.2 Analysing 8.6.3 Disposing 8.6.4 Checking 8.6.5 Report and recording 8.7 Patch upgrade 8.7.1 Responsibilities 8.7.2 Process of upgrading security patch 8.8 Securing configuration management 8.9 Emergency response plans 8.9.1 Development phase 8.9.2 Testing and implementation phase 8.9.3 Maintenance phase 8.10 Backup 8.11 Internal security audit 8.11.1 Requisites of security audit 8.11.2 Specific audit requirements Bibliography Information technology – Security techniques – Code of practice for information security controls based on ISO/IEC 27002 for cloud services 1 Scope 2 Normative references 2.1 Identical Recommendations | International Standards 2.2 Additional References 3 Definitions and abbreviations 3.1 Terms defined elsewhere 3.2 Abbreviations 4 Cloud sector-specific concepts 4.1 Overview 4.2 Supplier relationships in cloud services 4.3 Relationships between cloud service customers and cloud service providers 4.4 Managing information security risks in cloud services 4.5 Structure of this standard 5 Information security policies 5.1 Management direction for information security 5.1.1 Policies for information security 5.1.2 Review of the policies for information security 6 Organization of information security 6.1 Internal organization 6.1.1 Information security roles and responsibilities 6.1.2 Segregation of duties 6.1.3 Contact with authorities 6.1.4 Contact with special interest groups 6.1.5 Information security in project management 6.2 Mobile devices and teleworking 6.2.1 Mobile device policy 6.2.2 Teleworking 7 Human resource security 7.1 Prior to employment 7.1.1 Screening 7.1.2 Terms and conditions of employment 7.2 During employment 7.2.1 Management responsibilities 7.2.2 Information security awareness, education and training 7.2.3 Disciplinary process 7.3 Termination and change of employment 7.3.1 Termination or change of employment responsibilities 8 Asset management 8.1 Responsibility for assets 8.1.1 Inventory of assets 8.1.2 Ownership of assets 8.1.3 The acceptable use of assets 8.1.4 Return of assets 8.2 Information classification 8.2.1 Classification of information 8.2.2 Labelling of information 8.2.3 Handling of assets 8.3 Media handling 8.3.1 Management of removable media 8.3.2 Disposal of media 8.3.3 Physical media transfer 9 Access control 9.1 Business requirements of access control 9.1.1 Access control policy 9.1.2 Access to networks and network services 9.2 User access management 9.2.1 User registration and deregistration 9.2.2 User access provisioning 9.2.3 Management of privileged access rights 9.2.4 Management of secret authentication information of users 9.2.5 Review of user access rights 9.2.6 Removal or adjustment of access rights 9.3 User responsibilities 9.3.1 Use of secret authentication information 9.4 System and application access control 9.4.1 Information access restriction 9.4.2 Secure log-on procedures 9.4.3 Password management system 9.4.4 Use of privileged utility programs 9.4.5 Access control to program source code 10 Cryptography 10.1 Cryptographic controls 10.1.1 Policy on the use of cryptographic controls 10.1.2 Key management 11 Physical and environmental security 11.1 Secure areas 11.1.1 Physical security perimeter 11.1.2 Physical entry controls 11.1.3 Securing offices, rooms and facilities 11.1.4 Protecting against external and environmental threats 11.1.5 Working in secure areas 11.1.6 Delivery and loading areas 11.2 Equipment 11.2.1 Equipment siting and protection 11.2.2 Supporting utilities 11.2.3 Cabling security 11.2.4 Equipment maintenance 11.2.5 Removal of assets 11.2.6 Security of equipment and assets off-premises 11.2.7 Secure disposal or reuse of equipment 11.2.8 Unattended user equipment 11.2.9 Clear desk and clear screen policy 12 Operations security 12.1 Operational procedures and responsibilities 12.1.1 Documented operating procedures 12.1.2 Change management 12.1.3 Capacity management 12.1.4 Separation of development, testing and operational environments 12.2 Protection from malware 12.2.1 Controls against malware 12.3 Backup 12.3.1 Information backup 12.4 Logging and monitoring 12.4.1 Event logging 12.4.2 Protection of log information 12.4.3 Administrator and operator logs 12.4.4 Clock synchronization 12.5 Control of operational software 12.5.1 Installation of software on operational systems 12.6 Technical vulnerability management 12.6.1 Management of technical vulnerabilities 12.6.2 Restrictions on software installation 12.7 Information systems audit considerations 12.7.1 Information systems audit controls 13 Communications security 13.1 Network security management 13.1.1 Network controls 13.1.2 Security of network services 13.1.3 Segregation in networks 13.2 Information transfer 13.2.1 Information transfer policies and procedures 13.2.2 Agreements on information transfer 13.2.3 Electronic messaging 13.2.4 Confidentiality or non-disclosure agreements 14 System acquisition, development and maintenance 14.1 Security requirements of information systems 14.1.1 Information security requirements analysis and specification 14.1.2 Securing applications services on public networks 14.1.3 Protecting application services transactions 14.2 Security in development and support processes 14.2.1 Secure development policy 14.2.2 System change control procedures 14.2.3 Technical review of applications after operating platform changes 14.2.4 Restrictions on changes to software packages 14.2.5 Secure system engineering principles 14.2.6 Secure development environment 14.2.7 Outsourced development 14.2.8 System security testing 14.2.9 System acceptance testing 14.3 Test data 14.3.1 Protection of test data 15 Supplier relationships 15.1 Information security in supplier relationships 15.1.1 Information security policy for supplier relationships 15.1.2 Addressing security within supplier agreements 15.1.3 Information and communication technology supply chain 15.2 Supplier service delivery management 15.2.1 Monitoring and review of supplier services 15.2.2 Managing changes to supplier services 16 Information security incident management 16.1 Management of information security incidents and improvements 16.1.1 Responsibilities and procedures 16.1.2 Reporting information security events 16.1.3 Reporting information security weaknesses 16.1.4 Assessment of and decision on information security events 16.1.5 Response to information security incidents 16.1.6 Learning from information security incidents 16.1.7 Collection of evidence 17 Information security aspects of business continuity management 17.1 Information security continuity 17.1.1 Planning information security continuity 17.1.2 Implementing information security continuity 17.1.3 Verify, review and evaluate information security continuity 17.2 Redundancies 17.2.1 Availability of information processing facilities 18 Compliance 18.1 Compliance with legal and contractual requirements 18.1.1 Identification of applicable legislation and contractual requirements 18.1.2 Intellectual property rights 18.1.3 Protection of records 18.1.4 Privacy and protection of personally identifiable information 18.1.5 Regulation of cryptographic controls 18.2 Information security reviews 18.2.1 Independent review of information security 18.2.2 Compliance with security policies and standards 18.2.3 Technical compliance review Annex A Cloud service extended control set Annex B References on information security risk related to cloud computing Bibliography ITU Technology Watch Report 8. Assisting developing countries Requirements and challenges regarding provision and consumption of cloud computing services in developing countries 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Supplement 4 Abbreviations and acronyms 5 Conventions 6 Overview 6.1 Key characteristics 6.2 Deployment models 6.3 Service categories 6.4 Benefits of cloud computing 7 Questionnaire findings 7.1 Questionnaire respondents 7.2 Deployment of cloud computing in developing countries 7.3 Applications and services 7.4 Infrastructure requirements 7.5 Costs associated with cloud computing adoption 8 Cloud computing requirements in developing countries 8.1 Standardization requirements 8.1.1 Cybersecurity 8.1.2 Interoperability and portability 8.1.3 Service level agreements (SLA) 8.1.4 Green standards 8.1.5 Other standards 8.2 Human resources 8.3 Data centres 8.3.1 Data centres – Case studies 8.4 Electricity supply 8.5 Network infrastructure 8.6 Trust 9 Challenges of cloud computing adoption 9.1 Lack of regulatory framework for cloud computing services 9.2 Security and privacy concerns 9.3 Infrastructure needs 9.4 Capacity building 9.5 Quality of service 9.6 Compliance limitations 9.7 High cost of broadband Internet 10 General recommendations on adoption of cloud computing by developing countries 10.1 Regulatory framework 10.2 Standards adoption 10.3 Basic broadband infrastructure 10.4 Internet exchange points 10.5 Reliable electricity 10.6 Data centres Appendix I Presentation of the results of the questionnaires for cloud service customers I.1 List of responders I.2 Responses to the questionnaire Appendix II Results of the questionnaire for cloud service providers (CSPs) on cloud computing status in developing countries II.1 List of responders II.2 Responses to the questionnaire Bibliography ITU Report