{"id":350166,"date":"2024-10-20T00:40:47","date_gmt":"2024-10-20T00:40:47","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-7799-32017\/"},"modified":"2024-10-26T00:25:49","modified_gmt":"2024-10-26T00:25:49","slug":"bs-7799-32017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-7799-32017\/","title":{"rendered":"BS 7799-3:2017"},"content":{"rendered":"

This British Standard provides guidance to assist organizations to:<\/p>\n

    \n
  1. \n

    fulfil the requirements of BS EN ISO\/IEC 27001 concerning risks and opportunities; and<\/p>\n<\/li>\n

  2. \n

    define, apply, maintain and evaluate risk management processes in the information security context.<\/p>\n<\/li>\n<\/ol>\n

    This British Standard is relevant to:<\/p>\n

      \n
    1. \n

      organizations who have or are intending to have an information security management system (ISMS) that conforms to BS EN ISO\/IEC 27001; and<\/p>\n<\/li>\n

    2. \n

      persons that perform or are involved in information security risk management (e.g. interested parties, risk owners and ISMS professionals).<\/p>\n<\/li>\n<\/ol>\n

      This document is applicable to all organizations, regardless of type, size or nature.<\/p>\n

      PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
      PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
      4<\/td>\nForeword <\/td>\n<\/tr>\n
      7<\/td>\nIntroduction
      1 Scope <\/td>\n<\/tr>\n
      8<\/td>\n2 Normative references
      3 Terms and definitions
      4 Overview of information security risk assessment and risk treatment <\/td>\n<\/tr>\n
      9<\/td>\nFigure 1 \u2014 The information security risk assessment and risk treatment processes of BS EN ISO\/IEC 27001
      5 Communication and consultation <\/td>\n<\/tr>\n
      10<\/td>\n6 Context establishment <\/td>\n<\/tr>\n
      14<\/td>\nTable 1 \u2014 Example logarithmic likelihood scale
      Table 2 \u2014 Example logarithmic consequence scale <\/td>\n<\/tr>\n
      15<\/td>\nTable 3 \u2014 Example indicator scales <\/td>\n<\/tr>\n
      17<\/td>\n7 Risk identification and analysis <\/td>\n<\/tr>\n
      19<\/td>\nTable 4 \u2014 Example scenarios that give coverage of the controls in BS EN ISO\/IEC 27001:2017, Annex A <\/td>\n<\/tr>\n
      22<\/td>\n8 Information security risk treatment <\/td>\n<\/tr>\n
      27<\/td>\n9 Verification of necessary controls <\/td>\n<\/tr>\n
      28<\/td>\nFigure 2 \u2014 The cross-checking process <\/td>\n<\/tr>\n
      29<\/td>\nFigure 3 \u2014 The cross-checking process following rework <\/td>\n<\/tr>\n
      30<\/td>\n10 Approval
      11 Operation <\/td>\n<\/tr>\n
      31<\/td>\n12 Monitoring, audit and review <\/td>\n<\/tr>\n
      33<\/td>\n13 Documented information <\/td>\n<\/tr>\n
      35<\/td>\nAnnex A (informative)\u2002 Correspondence between BS 7799-3:2006 and BS 7799-3:2017 <\/td>\n<\/tr>\n
      36<\/td>\nTable A.1 \u2014 Correspondence between BS 7799-3:2006 and BS 7799-3:2017 <\/td>\n<\/tr>\n
      37<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

      Information security management systems – Guidelines for information security risk management<\/b><\/p>\n\n\n\n\n
      Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
      BSI<\/b><\/a><\/td>\n2017<\/td>\n38<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":350173,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-350166","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/350166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/350173"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=350166"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=350166"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=350166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}