{"id":347181,"date":"2024-10-20T00:24:57","date_gmt":"2024-10-20T00:24:57","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-ts-330522016\/"},"modified":"2024-10-25T23:54:25","modified_gmt":"2024-10-25T23:54:25","slug":"bsi-pd-iso-iec-ts-330522016","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-ts-330522016\/","title":{"rendered":"BSI PD ISO\/IEC TS 33052:2016"},"content":{"rendered":"
This Technical Specification defines a process reference model (PRM) for the domain of information security management. The model architecture specifies a process architecture for the domain and comprises a set of processes, with each described in terms of process purpose and outcomes.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Overview of the PRM <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 5 Process descriptions 5.1 Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5.2 ORG.1 Asset management 5.3 TEC.01 Capacity management <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.4 TEC.02 Change management 5.5 COM.01 Communication management <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.6 TEC.03 Configuration management 5.7 COM.02 Documentation management <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.8 ORG.2 Equipment management <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.9 ORG.3 Human resource employment management <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.10 COM.03 Human resource management <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.11 COM.04 Improvement 5.12 TEC.04 Incident management 5.13 ORG.4 Infrastructure and work environment <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.14 COM.05 Internal audit 5.15 TOP.1 Leadership <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.16 COM.06 Management review <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.17 COM.07 Non-conformity management 5.18 COM.09 Operational implementation and control <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.19 COM.08 Operational planning <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.20 COM.10 Performance evaluation <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.21 TEC.05 Product\/service release 5.22 TEC.08 Product\/Service\/System requirements <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.23 COM.11 Risk and opportunity management 5.24 TEC.06 Service availability management <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.25 TEC.07 Service continuity management 5.26 ORG.5 Supplier management <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.27 TEC.09 Technical data preservation and recovery <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex\u00a0A (informative) The relationship between management system requirements and a process reference model <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | Annex\u00a0B (informative) Statement of conformity to ISO\/IEC\u00a033004 <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Process reference model (PRM) for information security management<\/b><\/p>\n |