Page 38 - Cloud computing: From paradigm to operation
P. 38

1                                    Framework and requirements for cloud computing


            –       Auditability  for  trusted  cloud  service:  It  is  recommended  for  trusted  cloud  services  to  include
                    appropriate  mechanisms  for  collecting  and  making  available  necessary  evidential  information
                    related to the operation and use of a cloud service, for the purpose of conducting an audit;
                    NOTE 4 – Part of this requirement refers to [ITU-T Y.3502].
            –       Service agreement for trusted cloud service: It is recommended for trusted cloud services to have
                    appropriate  service  agreements  or  contracts  for  commitments  to  CSC  on  terms  of  their
                    requirements and considerations.


            17      Security considerations

            The security framework from cloud computing [ITU-T X.1601], analyses security threats and challenges in the
            cloud computing environment, describes security capabilities that could mitigate these threats and addresses
            security challenges.
            [ITU-T X.1631] provides guidelines supporting the implementation of information security controls for CSCs
            and CSPs. Many of the guidelines guide the CSPs to assist the CSCs in implementing the controls and guide
            the  CSCs  to  implement  such  controls.  Selection  of  appropriate  information  security  controls  and  the
            application of the implementation guidance provided, will depend on a risk assessment as well as any legal,
            contractual, regulatory or other cloud-sector specific information security requirements.

            Regarding the protection of PII, ISO/IEC 27018 is designed for organizations to use as a reference for selecting
            PII  protection  controls  within  the  process  of  implementing  a  cloud  computing  information  security
            management system based on ISO/IEC 27001, or as a guidance document for organizations for implementing
            commonly accepted PII protection controls.





















































            30
   33   34   35   36   37   38   39   40   41   42   43