Table of Contents - X.1647 (10/2024) - Security guidelines for selecting computing methods and resources from cloud service providers

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Background
6.1 Overview
6.2 Security challenges
7 Awareness of security of computing resources, methods and tasks
7.1 Overview
7.2 Awareness of security of the computing resources provided by CSPs
7.3 Awareness of security of the secure computing methods
7.4 Awareness of security requirements of computing tasks
8 Selection method of secure computing methods and resources
8.1 Overview
8.2 Options of computing resources and methods
8.3 Preliminary filtering of computing resources and methods
8.4 Security evaluation of the computing resources and methods
8.5 Resources and methods filtering
8.6 Policy-based computing resources and methods selection
Appendix I – Use cases of the selection of secure computing methods and resources for outsourcing computation to CSPs
I.1 Use case: A customer performs the computing task with own data
I.2 Use case: Customers collaborate to perform the computing task
I.3 Use case: CSPs collaborate to perform the computing task
Bibliography