As the lead study group on "Telecom security", which includes developing and maintaining security outreach material, coordination of security-related work and identification of needs and assignment and prioritization of work to encourage timely development of telecom security recommendations, ITU-T SG 17 covers the topic of cloud-computing security issues in its Question 8/17, while other SG 17 Questions address topics such as information security management.
When implemented correctly, along with associated security keys and data management policies, encryption enables the user and the enterprise to isolate data and associated policies, particularly in shared, multi-tenant environments like cloud storage.
関連のセキュリティキーとデータ管理政策に従い正しく導入されれば、暗号化は、特にクラウドストレージのような共有の複数テナントの環境において、利用者や企業がデータや関連政策を孤立させることを可能にします。