• There are no items in your cart

16/30275200 DC : 0

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

BS ISO/IEC 27036-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 4: GUIDELINES FOR SECURITY OF CLOUD SERVICES
Available format(s)

Hardcopy , PDF

Superseded date

10-31-2016

Language(s)

English

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Structure of this International Standard
5 Key cloud concepts and security
  threats and risks
6 Information security controls in cloud
  service acquisition lifecycle
7 Information security controls in cloud
  service providers
Annex A (informative) - Information security
        standards for cloud providers
Annex B (informative) - Mapping to ISO/IEC 27017
        controls
Bibliography

BS ISO/IEC 27036-4.

Committee
IST/33/4
DocumentType
Draft
Pages
31
PublisherName
British Standards Institution
Status
Superseded
SupersededBy

ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
ISO/IEC 27018:2014 Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
ISO/IEC 29115:2013 Information technology Security techniques Entity authentication assurance framework
ISO/IEC 27036-3:2013 Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security
ISO/IEC 27036-1:2014 Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts
ISO/IEC 27036-2:2014 Information technology Security techniques Information security for supplier relationships Part 2: Requirements
ISO/IEC 17788:2014 Information technology — Cloud computing — Overview and vocabulary

View more information
US$23.96
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.