Information technology -- Cloud computing -- Framework of trust for processing of multi-sourced data Read more about Information technology -- Cloud computing -- Framework of trust for processing of multi-sourced data
Information technology -- Cloud computing -- Guidance for policy development Read more about Information technology -- Cloud computing -- Guidance for policy development
Information technology -- Cloud computing -- Interoperability and portability Read more about Information technology -- Cloud computing -- Interoperability and portability
Information technology -- Cloud computing -- Service level agreement (SLA) framework -- Part 3: Core conformance requirements Read more about Information technology -- Cloud computing -- Service level agreement (SLA) framework -- Part 3: Core conformance requirements
Cloud computing -- Service level agreement (SLA) framework -- Part 2: Metric model Read more about Cloud computing -- Service level agreement (SLA) framework -- Part 2: Metric model
Information technology -- Security techniques -- Code of practice for information security controls based on ISO/IEC 27002 for cloud services Read more about Information technology -- Security techniques -- Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Guidance for the production of protection profiles and security targets Read more about Guidance for the production of protection profiles and security targets
Security assurance framework -- Part 1: Introduction and concepts Read more about Security assurance framework -- Part 1: Introduction and concepts
Evaluation criteria for IT security -- Part 3: Security assurance components Read more about Evaluation criteria for IT security -- Part 3: Security assurance components
Evaluation criteria for IT security -- Part 2: Security functional components Read more about Evaluation criteria for IT security -- Part 2: Security functional components
Evaluation criteria for IT security -- Part 1: Introduction and general model Read more about Evaluation criteria for IT security -- Part 1: Introduction and general model