Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Overview   
        6.1     Specification of the data in this Recommendation         
        6.2     Data security threats for cloud service customers         
        6.3     Existing requirements related to about data security   
        6.4     Data security lifecycle
 7     Guidelines for security controls related to data security        
        7.1     Security controls in create stage            
        7.2     Security controls in transmit stage        
        7.3     Security controls in storage stage         
        7.4     Security controls in use stage 
        7.5     Security controls in migrate stage         
        7.6     Security controls in destroy stage         
        7.7     Security controls in backup and restore stage 
Appendix I – Guidelines for using security controls    
Bibliography