ISO/IEC
27036-4:2016(E)
ISO
Online
browsing
platform: available
at
http:(/www.iso.org/obp
4 Structure
of
this
document
This
document
should
be
used
in combination
with
the
other
parts
within
ISO/IEC 27036. It is
necessary
to
follow ISO/IEC 27036-1, ISO/IEC 27036-2
and
ISO/IEC 27036-3 to implement
the
guidelines. This
document
should
be
used
as additional guidelines for
information
security
specifically
addressing
cloud services;
security
controls for cloud services
are
found in ISO/IEC 27017
and
ISO/IEC 27018.
Mapping of
security
controls
can
be
found in Annex A. This
document
is
structured
to
be
harmonized
with
ISO/IEC/IEEE
15288
and
ISO/IEC 12207. Clause 6
mirrors
lifecycle
processes
provided
in
those
two
standards.
This
document
is also
harmonized
with
ISO/IEC 27017
and
provides a mapping of
ISO/IEC 27017
information
security
controls to
the
lifecycle
processes
in Annex B.
NOTE
1 Clause 6 is particularly applicable to public cloud deployment models.
NOTE
2 In each table
presented
in Clause 6 a blank column is
inserted
between
the columns of"cloud service
customer"
and
"cloud service provider". This blank column indicates
that
the
guidance given for cloud service
customer
and
cloud service provider
are
separate
and
not
related.
The
documents
named
in
this
document
are
generic
and
do
not
need
to
be
elaborated
or
be
separate
documents. Organizations should
use
existing
documents
to
integrate
cloud service supply chain
security.
5 Key cloud concepts and
security
threats and risks
5.1 Characteristics
of
cloud computing
According
to
the
definition of cloud computing,
underpinning
the
cloud capabilities
types
and
cloud
service categories
are
a
number
of technologies (such as
server
virtualization
and
Service Oriented
Architecture)
that
enable provision of
the
service. These cloud services typically use
shared
resources
in which a cloud service
provider
can move
and
process a cloud service
customer's
information
to
deliver
the
most
efficient service
at
minimal cost.
ISO/IEC 17788 defines
three
cloud capabilities
types
which
are
typically
shared
and
consumed
by
many
cloud service
customers
in supplier relationships. The following
are
the
defined capabilities types:
a)
application;
b)
infrastructure;
c)
platform.
Within ISO/IEC 27036,
the
term
"acquirer" is
used
to
indicate a
stakeholder
that
procures
a
product
or
service from
another
party
and
an
organization;
the
term
"supplier" is
used
for
an
individual
that
enters
into
agreement
with
the
acquirer
for
the
supply of a
product
or
service, respectively. In
this
document,
the
terms
cloud service
customer
for
the
acquirer
and
cloud service
provider
for
the
supplier
are
used
to
differentiate
between
the
roles in supplier relationships
and
to
highlight specific roles
regarding
cloud services.
There
are
differences
and
similarities in acquisition process
between
public cloud deployment models
and
I
CT
outsourcing
as
shown
in Figure
1.
The following highlights differences
between
use
of cloud
services
based
on
the
public cloud
deployment
model
and
other
information
services.
a)
The cloud service is generally
standardized
with
limited flexibility for customization;
b)
The cloud service
provider
provides
the
cloud service
customers
with
pre-determined
information
security
controls;
c)
The cloud service
provider
does
not
usually accept
an
audit
being conducted
by
an
individual
customer;
2