Summary - X.1647 (10/2024) - Security guidelines for selecting computing methods and resources from cloud service providers

With the development of cloud computing, computing tasks can be outsourced to external computing resources for computation. However, computing resources differ in the security levels they offer, and computing tasks differ in their security requirements. To mitigate the security threats introduced by insecure computing resources and satisfy the security requirements of computing tasks, secure computation methods can be applied.
Recommendation ITU-T X.1647 provides guidelines for the selection of secure computation methods and resources from cloud service providers (CSPs) to help service customers or stakeholders to execute outsourcing computation in a way that meets their security requirements.