• Shopping Cart
    There are no items in your cart

ISO/IEC 17789:2014

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Information technology — Cloud computing — Reference architecture

Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Superseded date

09-22-2023

Superseded by

ISO/IEC 22123-3:2023

Language(s)

English

Published date

10-10-2014

US$81.00
Excluding Tax where applicable

ISO/IEC 17789:2014 specifies the cloud computing reference architecture (CCRA). The reference architecture includes the cloud computing roles, cloud computing activities, and the cloud computing functional components and their relationships.

Committee
ISO/IEC JTC 1/SC 38
DocumentType
Standard
Pages
53
PublisherName
International Organization for Standardization
Status
Superseded
SupersededBy

BS ISO/IEC 19944:2017 Information technology. Cloud computing. Cloud services and devices: Data flow, data categories and data use
18/30346433 DC : 0 BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY
BS ISO/IEC 19086-1:2016 Information technology. Cloud computing. Service level agreement (SLA) framework Overview and concepts
TS 103 532 : 1.1.1 CYBER; ATTRIBUTE BASED ENCRYPTION FOR ATTRIBUTE BASED ACCESS CONTROL
ISO/IEC 18384-2:2016 Information technology Reference Architecture for Service Oriented Architecture (SOA RA) Part 2: Reference Architecture for SOA Solutions
ISO/IEC 19086-1:2016 Information technology Cloud computing Service level agreement (SLA) framework Part 1: Overview and concepts
GR NFV 001 : 1.2.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); USE CASES
CSA ISO/IEC 27018 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS
ISO/IEC 27036-4:2016 Information technology Security techniques Information security for supplier relationships Part 4: Guidelines for security of cloud services
BS ISO/IEC 19086-3:2017 Information technology. Cloud computing. Service level agreement (SLA) framework Core conformance requirements
ISO/IEC 19944:2017 Information technology Cloud computing Cloud services and devices: Data flow, data categories and data use
TR 103 304 : 1.1.1 CYBER; PERSONALLY IDENTIFIABLE INFORMATION (PII) PROTECTION IN MOBILE AND CLOUD SERVICES
ISO/IEC 19941:2017 Information technology — Cloud computing — Interoperability and portability
ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
16/30336264 DC : 0 BS ISO/IEC 19086-3 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 3: CORE CONFORMANCE REQUIREMENTS
18/30348902 DC : 0 BS ISO/IEC 21878 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY GUIDELINES FOR DESIGN AND IMPLEMENTATION OF VIRTUALIZED SERVERS
SR 003 392 : 2.1.1 CLOUD STANDARDS COORDINATION PHASE 2; CLOUD COMPUTING STANDARDS MATURITY ASSESSMENT; A NEW SNAPSHOT OF CLOUD COMPUTING STANDARDS
BS ISO/IEC 27036-4:2016 Information technology. Security techniques. Information security for supplier relationships Guidelines for security of cloud services
CAN/CSA-ISO/IEC 27017:16 Information technology Security techniques Code of practice for information security controls based on ISO/IEC 27002 for cloud services (Adopted ISO/IEC 27017:2015, first edition, 2015-12-15)
16/30313038 DC : 0 BS ISO/IEC 19944 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - CLOUD SERVICES AND DEVICES: DATA FLOW, DATA CATEGORIES AND DATA USE
BS ISO/IEC 27018:2014 Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
BS ISO/IEC 27017:2015 Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services
ISO/IEC TR 38505-2:2018 Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management
GS NFV-REL 005 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); ACCOUNTABILITY; REPORT ON QUALITY ACCOUNTABILITY FRAMEWORK
BS ISO/IEC 18384-2:2016 Information technology. Reference Architecture for Service Oriented Architecture (SOA RA) Reference Architecture for SOA Solutions
BS ISO/IEC 19941:2017 Information technology. Cloud computing. Interoperability and portability
16/30316173 DC : 0 BS ISO/IEC 19086-1 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS
13/30266767 DC : 0 BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS
SR 003 391 : 2.1.1 CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING
ISO/IEC 19086-3:2017 Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements
ISO/IEC TR 20000-9:2015 Information technology Service management Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services
17/30313035 DC : 0 BS ISO/IEC 19941 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - INTEROPERABILITY AND PORTABILITY
PD ISO/IEC TR 20000-9:2015 Information technology. Service management Guidance on the application of ISO/IEC 20000-1 to cloud services
15/30259619 DC : 0 BS ISO/IEC 27017 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES
DIN ISO/IEC 27018:2017-08 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014)
ISO/IEC 27018:2014 Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
SR 003 381 : 2.1.1 CLOUD STANDARDS COORDINATION PHASE 2; IDENTIFICATION OF CLOUD USER NEEDS
CAN/CSA-ISO/IEC 19086-1:18 Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts (Adopted ISO/IEC 19086-1:2016, first edition, 2016-09-15)
CEI UNI EN ISO/IEC 23053:2023 Framework for Artificial Intelligence (AI) Systems Using Machine Learning (ML)
CAN/CSA-ISO/IEC 27036-4:18 Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services (Adopted ISO/IEC 27036-4:2016, first edition, 2016-10-01)

ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC/IEEE 24765:2017 Systems and software engineering — Vocabulary
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO/IEC 27018:2014 Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
ISO/IEC/IEEE 42010:2011 Systems and software engineering — Architecture description
SA/SNZ TR ISO/IEC 38505.2:2019 Information technology - Governance of IT - Governance of data Implications of ISO/IEC 38505-1 for data management
ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
ISO/IEC 17788:2014 Information technology — Cloud computing — Overview and vocabulary
ISO/IEC 29100:2011 Information technology — Security techniques — Privacy framework

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.