ISO/IEC 17789:2014
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
Information technology — Cloud computing — Reference architecture
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
09-22-2023
English
10-10-2014
ISO/IEC 17789:2014 specifies the cloud computing reference architecture (CCRA). The reference architecture includes the cloud computing roles, cloud computing activities, and the cloud computing functional components and their relationships.
Committee |
ISO/IEC JTC 1/SC 38
|
DocumentType |
Standard
|
Pages |
53
|
PublisherName |
International Organization for Standardization
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
DS ISO/IEC 17789 : 2014 | Identical |
AS ISO/IEC 17789:2020 | Identical |
DIN ISO/IEC 17789:2017-07 | Identical |
NEN ISO/IEC 17789 : 2014 | Identical |
BS ISO/IEC 17789:2014 | Identical |
SS-ISO/IEC 17789 : 2014 | Identical |
CAN/CSA-ISO/IEC 17789:16 | Identical |
NS ISO/IEC 17789 : 2014 | Identical |
INCITS/ISO/IEC 17789 : 2017 | Identical |
PN ISO/IEC 17789 : 2017 | Identical |
SAC GB/T 32399 : 2015 | Identical |
DIN ISO/IEC 17789:2016-10 (Draft) | Identical |
DIN ISO/IEC 17789 E : 2017 | Identical |
BS ISO/IEC 19944:2017 | Information technology. Cloud computing. Cloud services and devices: Data flow, data categories and data use |
18/30346433 DC : 0 | BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY |
BS ISO/IEC 19086-1:2016 | Information technology. Cloud computing. Service level agreement (SLA) framework Overview and concepts |
TS 103 532 : 1.1.1 | CYBER; ATTRIBUTE BASED ENCRYPTION FOR ATTRIBUTE BASED ACCESS CONTROL |
ISO/IEC 18384-2:2016 | Information technology Reference Architecture for Service Oriented Architecture (SOA RA) Part 2: Reference Architecture for SOA Solutions |
ISO/IEC 19086-1:2016 | Information technology Cloud computing Service level agreement (SLA) framework Part 1: Overview and concepts |
GR NFV 001 : 1.2.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV); USE CASES |
CSA ISO/IEC 27018 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
ISO/IEC 27036-4:2016 | Information technology Security techniques Information security for supplier relationships Part 4: Guidelines for security of cloud services |
BS ISO/IEC 19086-3:2017 | Information technology. Cloud computing. Service level agreement (SLA) framework Core conformance requirements |
ISO/IEC 19944:2017 | Information technology Cloud computing Cloud services and devices: Data flow, data categories and data use |
TR 103 304 : 1.1.1 | CYBER; PERSONALLY IDENTIFIABLE INFORMATION (PII) PROTECTION IN MOBILE AND CLOUD SERVICES |
ISO/IEC 19941:2017 | Information technology — Cloud computing — Interoperability and portability |
ISO/IEC 27017:2015 | Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
16/30336264 DC : 0 | BS ISO/IEC 19086-3 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 3: CORE CONFORMANCE REQUIREMENTS |
18/30348902 DC : 0 | BS ISO/IEC 21878 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY GUIDELINES FOR DESIGN AND IMPLEMENTATION OF VIRTUALIZED SERVERS |
SR 003 392 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; CLOUD COMPUTING STANDARDS MATURITY ASSESSMENT; A NEW SNAPSHOT OF CLOUD COMPUTING STANDARDS |
BS ISO/IEC 27036-4:2016 | Information technology. Security techniques. Information security for supplier relationships Guidelines for security of cloud services |
CAN/CSA-ISO/IEC 27017:16 | Information technology Security techniques Code of practice for information security controls based on ISO/IEC 27002 for cloud services (Adopted ISO/IEC 27017:2015, first edition, 2015-12-15) |
16/30313038 DC : 0 | BS ISO/IEC 19944 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - CLOUD SERVICES AND DEVICES: DATA FLOW, DATA CATEGORIES AND DATA USE |
BS ISO/IEC 27018:2014 | Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
BS ISO/IEC 27017:2015 | Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
ISO/IEC TR 38505-2:2018 | Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management |
GS NFV-REL 005 : 1.1.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV); ACCOUNTABILITY; REPORT ON QUALITY ACCOUNTABILITY FRAMEWORK |
BS ISO/IEC 18384-2:2016 | Information technology. Reference Architecture for Service Oriented Architecture (SOA RA) Reference Architecture for SOA Solutions |
BS ISO/IEC 19941:2017 | Information technology. Cloud computing. Interoperability and portability |
16/30316173 DC : 0 | BS ISO/IEC 19086-1 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS |
13/30266767 DC : 0 | BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
CAN/CSA-ISO/IEC 19086-1:18 | Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts (Adopted ISO/IEC 19086-1:2016, first edition, 2016-09-15) |
SR 003 391 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
ISO/IEC 19086-3:2017 | Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements |
CAN/CSA-ISO/IEC 27036-4:18 | Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services (Adopted ISO/IEC 27036-4:2016, first edition, 2016-10-01) |
ISO/IEC TR 20000-9:2015 | Information technology Service management Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services |
17/30313035 DC : 0 | BS ISO/IEC 19941 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - INTEROPERABILITY AND PORTABILITY |
PD ISO/IEC TR 20000-9:2015 | Information technology. Service management Guidance on the application of ISO/IEC 20000-1 to cloud services |
15/30259619 DC : 0 | BS ISO/IEC 27017 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
DIN ISO/IEC 27018:2017-08 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
ISO/IEC 27018:2014 | Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
SR 003 381 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; IDENTIFICATION OF CLOUD USER NEEDS |
CEI UNI EN ISO/IEC 23053:2023 | Framework for Artificial Intelligence (AI) Systems Using Machine Learning (ML) |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC/IEEE 24765:2017 | Systems and software engineering — Vocabulary |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/IEC 27018:2014 | Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
ISO/IEC/IEEE 42010:2011 | Systems and software engineering — Architecture description |
SA/SNZ TR ISO/IEC 38505.2:2019 | Information technology - Governance of IT - Governance of data Implications of ISO/IEC 38505-1 for data management |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
ISO/IEC 17788:2014 | Information technology — Cloud computing — Overview and vocabulary |
ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Please Login or Create an Account so you can add users to your Multi user PDF Later.
Important note : All end users must be registered with an Account prior to user licenses being assigned.
Users cannot be edited or removed once added to your Multi user PDF.
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.