Cloud computing - Requirements for cloud service development and operation management
Draft Recommendation ITU-T Y.cccsdaom-reqts: Cloud computing - Requirements for cloud service development and operation management
Draft Recommendation ITU-T Y.cccsdaom-reqts: Cloud computing - Requirements for cloud service development and operation management
Draft M.rcsm: Requirements for Cloud Service Management in Cloud-Integrated Telecom BSS/OSS
This recommendation provides end-to-end fault and performance management framework of virtual network services (VNSs) in inter-cloud computing and relevant use cases. In particular, the aspects of faults detection and localization of affected area in inter-cloud environments is presented.
Draft new Recommendation ITU-T Y.ccvnf-dm: "Cloud computing - Data model framework for NaaS OSS virtualized network function"
Draft new Recommendation ITU-T Y.MLaaS-reqts: "Cloud computing- functional requirements for machine learning as a service"
Draft new Recommendation ITU-T Y.BaaS-reqts: Cloud computing - functional requirements for blockchain as a service
Draft Recommendation ITU-T Y.3504 (formerly Y.DaaS-arch), "Functional Architecture for Desktop as a Service"
From a user perspective, Cloud is a service. However, for Cloud Service Providers, integrators and channel partners who construct or build the Cloud, the Cloud architecture is comprised of many Cloud computing components. Examples of these components are hypervisors, Cloud operating systems components such as “Swift”, “Glance” for OpenStack, virtual desktop infrastructure platforms, cloud dedicated firewalls and so on. How can we evaluate the security of these Cloud components? Currently, most of the security standards related to Cloud Computing focus on the information security management system. However, these standards are insufficient to evaluate cloud component security because they focus on management security rather than the technical security requirements of the components. In order to address this gap, the Cloud Component Specifications working group proposes to develop internationally recognized technical security specifications for cloud components.
Given the longstanding and fervent belief in the value for incident sharing, new advancements in enabling technology, and the promising shifts in the legal landscape, the Cloud Security Alliance believes now is the time to act. For this reason we introduce the Cloud Cyber Incident Sharing Center or Cloud-CISC.
Recommendation ITU-T Y.3513 introduces the concept of Infrastructure as a Service (IaaS) and describes its functional requirements. As one of the cloud computing service categories, Infrastructure as a Service provides cloud service customers with computing, storage and network services by cloud service providers. To derive those requirements, relevant use cases are also presented.
Recommendation ITU-T Y.3511 describes the framework for interactions of multiple cloud service providers (CSPs), which is referred to as inter-cloud computing. Based on several use case, and after considering the different types of service offerings, this Recommendation describes the possible relationships (peering, federation or intermediary) among multiple CSPs. By introducing the concept of primary CSP and secondary CSP, the Recommendation further describes CSP interactions for the cases of federation and intermediary patterns. Finally, relevant functional requirements are derived.