Page 1015 - Cloud computing: From paradigm to operation
P. 1015

Security                                                   7


                                                    Table of Contents

            1     Scope
            2     References

            3     Definitions
                  3.1   Terms defined elsewhere
                  3.2   Terms defined in this Recommendation
            4     Abbreviations and acronyms

            5     Conventions
            6     Overview
                  6.1   Specification of the data in this Recommendation

                  6.2   Data security threats for cloud service customers
                  6.3   Existing requirements related to about data security
                  6.4   Data security lifecycle
            7     Guidelines for security controls related to data security

                  7.1   Security controls in create stage
                  7.2   Security controls in transmit stage
                  7.3   Security controls in storage stage
                  7.4   Security controls in use stage
                  7.5   Security controls in migrate stage
                  7.6   Security controls in destroy stage

                  7.7   Security controls in backup and restore stage
            Appendix I – Guidelines for using security controls

            Bibliography







































                                                                                                        1007
   1010   1011   1012   1013   1014   1015   1016   1017   1018   1019   1020