Page 1088 - Cloud computing: From paradigm to operation
P. 1088

7                                                     Security


            SPRING Singapore 2012, Annex B: Checklist of security and service level considerations when reviewing IaaS
            of Singapore Technical Reference 31:2012 Technical Reference for security and service level guidelines for
            the usage of public cloud computing services – March.

            SPRING Singapore 2013, Singapore Standard SS 584:2013 Specification for Multi-Tiered Cloud Computing
            Security – August.

            SPRING Singapore 2012, Singapore Technical Reference 30:2012 Technical Reference for virtualisation
            security for servers – March.
            SPRING Singapore 2012, Singapore Technical Reference 31:2012 Technical Reference for security and
            service level guidelines for the usage of public cloud computing services – March.
            US Government FedRAMP PMO 2014, FedRAMP Security Controls Baseline Version 2.0 – June.




                                                     Bibliography

            –       Recommendation ITU-T X.805 (2003), Security architecture for systems providing end-to-end
                    communications.
            –       ISO/IEC 17203:2011, Information technology – Open Virtualization Format (OVF) specification.
            –       ISO/IEC 27001:2013, Information technology – Security techniques – Information security
                    management systems – Requirements.
            –       ISO/IEC 27005:2011, Information technology – Security techniques – Information security risk
                    management.
            –       ISO/IEC 27018:2014, Information technology – Security techniques – Code of practice for protection
                    of personally identifiable information (PII) in public clouds acting as PII processors.
            –       ISO/IEC 27036-1:2014, Information technology – Security techniques – Information security for
                    supplier relationships – Part 1: Overview and concepts.
            –       ISO/IEC 27036-2:2014, Information technology – Security techniques – Information security for
                    supplier relationships – Part 2: Requirements.
            –       ISO/IEC 27036-3:2013, Information technology – Security techniques – Information security for
                    supplier relationships – Part 3: Guidelines for information and communication technology supply
                    chain security.
            –       ISO/IEC CD 27036-4, Information technology – Security techniques – Information security for
                    supplier relationships – Part 4: Guidelines for security of cloud services – (Under development).
            –       ISO/IEC 27040:2015, Information technology – Security techniques – Storage security.
            –       ISO 19440:2007, Enterprise integration – Constructs for enterprise modelling.
            –       ISO 31000:2009, Risk management – Principles and guidelines.

            –       NIST, SP 800-145 2011, The NIST Definition of Cloud Computing.
            –       NIST 2009, Effectively and Securely Using the Cloud Computing Paradigm.
            –       ENISA 2009, Cloud Computing Benefits, risks and recommendations for information security.
            –       Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0.
            –       Cloud Security Alliance, Top Threats to Cloud Computing V1.0.
            –       Cloud Security Alliance, Domain 12: Guidance for Identity & Access Management V2.1.
            –       ISACA, Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives.
            –       ISACA, Cloud Computing Management Audit/Assurance Program.





            1080
   1083   1084   1085   1086   1087   1088   1089   1090   1091   1092   1093