{"id":353895,"date":"2024-10-20T01:00:23","date_gmt":"2024-10-20T01:00:23","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-ts-231672020\/"},"modified":"2024-10-26T01:11:16","modified_gmt":"2024-10-26T01:11:16","slug":"bsi-pd-iso-iec-ts-231672020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-ts-231672020\/","title":{"rendered":"BSI PD ISO\/IEC TS 23167:2020"},"content":{"rendered":"
This document provides a description of a set of common technologies and techniques used in conjunction with cloud computing. These include:<\/p>\n
virtual machines (VMs) and hypervisors;<\/p>\n<\/li>\n
containers and container management systems (CMSs);<\/p>\n<\/li>\n
serverless computing;<\/p>\n<\/li>\n
microservices architecture;<\/p>\n<\/li>\n
automation;<\/p>\n<\/li>\n
platform as a service systems and architecture;<\/p>\n<\/li>\n
storage services;<\/p>\n<\/li>\n
security, scalability and networking as applied to the above cloud computing technologies.<\/p>\n<\/li>\n<\/ul>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4 Symbols and abbreviated terms 5 Overview of common technologies and techniques used in cloud computing 5.1 General <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.2 Technologies 5.2.1 General 5.2.2 Infrastructure capabilities type of cloud services <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.2.3 Platform capabilities cloud services 5.2.4 Application capabilities type cloud services 5.3 Techniques 6 Virtual machines and hypervisors 6.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.2 Virtual machines and system virtualization 6.3 Hypervisors 6.3.1 General <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.3.2 Type I hypervisors 6.3.3 Type II hypervisors <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.4 Security of VMs and hypervisors <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.5 VM images, metadata and formats <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7 Containers and container management systems (CMSs) 7.1 General 7.2 Containers and operating system virtualization 7.2.1 Description of containers <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.2.2 Container daemon <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 7.2.3 Container resources, isolation and control <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.3 Container images and filesystem layering 7.3.1 Image purpose and content <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7.3.2 Filesystem layering <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7.3.3 Container image repositories and registries <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7.4 Container management systems (CMSs) 7.4.1 General 7.4.2 Common CMS capabilities <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 8 Serverless computing 8.1 General <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 8.2 Functions as a service 8.2.1 Overview 8.2.2 Functions within FaaS <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 8.2.3 Serverless frameworks 8.2.4 FaaS relationship to microservices and containers <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 8.3 Serverless databases 9 Microservices architecture 9.1 General <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 9.2 Advantages and challenges of microservices <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 9.3 Specification of microservices 9.4 Multi-layered architecture <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 9.5 Service mesh <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 9.6 Circuit breaker 9.7 API gateway 10 Automation 10.1 General <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 10.2 Automation of the development lifecycle 10.3 Tooling for automation <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 11 Architecture of PaaS systems 11.1 General <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 11.2 Characteristics of PaaS systems <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 11.3 Architecture of components running under PaaS system <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 12 Data storage as a service 12.1 General <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 12.2 Common features of DSaaS <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 12.3 Capabilities type of DSaaS 12.4 Significant additional capabilities of DSaaS <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 13 Networking in cloud computing 13.1 Key aspects of networking 13.2 Cloud access networking <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 13.3 Intra-cloud networking <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 13.4 Virtual private networks (VPNs) and cloud computing <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 14 Cloud computing scalability 14.1 Scalability approaches <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 14.2 Parallel instances and load balancing <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 14.3 Elasticity and automation 14.4 Database scaling <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 15 Security and the cloud common technologies 15.1 General 15.2 Firewalls 15.3 Endpoint protection 15.4 Identity and access management <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 15.5 Data encryption 15.6 Key management <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | Annex A (informative) VM Images and disk images <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Cloud computing. Common technologies and techniques<\/b><\/p>\n |