ICS 35.040 L 80 GB 中华人民 让 /、 和国国家标准 GB/T 31167 信息安全技术 —2014 云计算服务安全指南 Information security technology-Security guide of cloud computing services 2014-09-03 发布 中华人民共和国国家质最监督检验检疫总局 中国国家标准化管理委员会 2015-04-01 实施 发布 中华人民共和国 国家标准 信息安全技术 云计算服务安全指南 GB/T 31167 2014 * 中国标准出版社出版发行 北京市朝阳区和平里西街甲 2 号 (100029) 北京市西城区三里河北街 16 号 (100045) 网址 www.spc.net.cn 总编室: (010)64275323 读者服务部: 发行中心: (010)51780235 (010)68523946 中国标准出版社秦皇岛印刷厂印刷 各地新华书店经销 * 开本 880X1230 1/16 2014 年 10 月第一版 印张 1.75 字数 44 千字 2014 年 10 月第一次印刷 * 书号: 155066·1-50121 定价 如有印装差错 27.00 兀 由本社发行中心调换 版权专有侵权必究 举报电话: (010)68510107 GB/T 31167-2014 目次 前言 ························································································································ill 弓 I 言 ························································································································IV 1 范围..................................................................................................................... 1 2 规范性弓 l 用文件...................................................................................................... 1 3 术语和定义............................................................................................................ 1 4 云计算概述 ············································································································2 5 6 7 8 9 4.1 云计算的主要特征·············································................................................ 4.2 服务模式..................... 4.3 部署模式····················································································..................... 4.4 云计算的优势································· 2 ····················································································2 3 ••••••••••••••••·•.••.•••••••••••••••••••••••••••••••••••.•••••••• 3 云计算的风险管理························........................................................................... 3 5.1 5.2 概述 ···············································································································3 5.3 云计算服务安全管理的主要角色及责任………………………………………………………… 5 5.4 云计算服务安全管理基本要求············ 5.5 云计算服务生命周期 云计算安全风险 ································································································4 规划准备·················· …... …......................................................... 5 ··························································································:) ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• 6 6.1 概述·············································......... 6.2 效益评估......................................................... 6.3 政府信息分类·············································································· 6.4 政府业务分类...... ·····························································································8 6.5 优先级确定···································· 6.6 安全保护要求························........................................................................... 6.7 6.8 需求分析···································································································...... •••••••••.•••••••• ••••••••• ······························6 ·············•·····················•·········... 6 ·····················7 ••••••••••••••••••.••••••••••••••••.•••••••••••••••••••••••••••••• 9 9 形成决策报告................................................................................................... 10 13 选择服务商与部署................................................................................................... 14 …......... ………... …... ….................. …... …... …...... ……… 14 7.1 云服务商安全能力要求...... 7.2 确定云服务商......................................................... 7.3 7.4 合同中的安全考虑................................. •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• 15 15 部署............................................................................................................... 17 运行监管............................................................................................................... 18 •••••••••••••••••••••••••••••••••••••••••• ••••••••••••••••••••.•.• 18 8.1 概述....................................................................................... 8.2 运行监管的角色与责任…............... 8.3 客户自身的运行监管.......................................................................................... 8.4 对云服务商的运行监管…......... …... …...

pdf文档 GBT-31167-2014-信息安全技术-云计算服务安全指南(OCR)

安全标准库 > 国家标准 > 国家标准 > 文档预览
28 页 0 下载 37 浏览 0 评论 0 收藏 3.0分
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
GBT-31167-2014-信息安全技术-云计算服务安全指南(OCR) 第 1 页 GBT-31167-2014-信息安全技术-云计算服务安全指南(OCR) 第 2 页 GBT-31167-2014-信息安全技术-云计算服务安全指南(OCR) 第 3 页 GBT-31167-2014-信息安全技术-云计算服务安全指南(OCR) 第 4 页 GBT-31167-2014-信息安全技术-云计算服务安全指南(OCR) 第 5 页
下载文档到电脑,方便使用
还有 23 页可预览,继续阅读
本文档由 侯茹2022-04-15 13:58:32上传分享
给文档打分
您好可以输入 255 个字符
安信天行文库的中文名是什么?( 答案:安信天行 )
评论列表
  • 暂时还没有评论,期待您的金玉良言