Page 1015 - Cloud computing: From paradigm to operation
P. 1015
Security 7
Table of Contents
1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
6.1 Specification of the data in this Recommendation
6.2 Data security threats for cloud service customers
6.3 Existing requirements related to about data security
6.4 Data security lifecycle
7 Guidelines for security controls related to data security
7.1 Security controls in create stage
7.2 Security controls in transmit stage
7.3 Security controls in storage stage
7.4 Security controls in use stage
7.5 Security controls in migrate stage
7.6 Security controls in destroy stage
7.7 Security controls in backup and restore stage
Appendix I – Guidelines for using security controls
Bibliography
1007