The solution to the problem of secure data centers for storage of information and state electronic information resources is offered through the implementation of technologies. State regulatory acts don`t solve the problem of providing security status during the remote processing of information in data centers using technologies, so the experience of international standards and best practices in this field are analyzed. The purpose of the article is to analyze the problem of information resources protection when using technologies. To achieve this goal, computing technologies are analyzed and comparative analysis of regulatory documents on information security when using technologies is conducted. Unique definitions and characteristics of computing which differentiate them from other types of computing technologies are also described, including such terms as on-demand self-service, resource pooling, instant resilience of resources, measured service. The classification and analysis of organizations and authorities that develop regulatory documents in the sphere of computing is provided and described. These establishments work on making international standards and have the following hierarchy of levels: international (ISO / IEC), interstate (forums and consortia (Cisco, CSA)), regional (European ETSI, CEN / CENELEC), national (laws and national standards, departmental regulations) , guides, instructions, for example: (NIST). The great consortia's role in standardizing and developing both technologies and information protection issues when using them is highlighted. The description of these consortia and their activity vectors are outlined. The documents, created by them, in the field of security are reviewed and compared to ISO 17788, NIST SP 500-299, Security Guidelines for Critical Cloud Computing CSAs and GOST R Information Protection. Requirements for the protection of information, processed with using the technology of cloud computing. Basic provisions. Basing on the conducted analysis, the reflection of service models in the regulatory documents is presented and the information on the methods of data protection in the field of computing, which is available in the documents, is summarized.