{"id":434134,"date":"2024-10-20T07:42:30","date_gmt":"2024-10-20T07:42:30","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-270322023\/"},"modified":"2024-10-26T14:37:41","modified_gmt":"2024-10-26T14:37:41","slug":"bs-iso-iec-270322023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-270322023\/","title":{"rendered":"BS ISO\/IEC 27032:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
12<\/td>\n4 Abbreviated terms <\/td>\n<\/tr>\n
13<\/td>\n5 Relationship between Internet security, web security, network security and cybersecurity <\/td>\n<\/tr>\n
15<\/td>\n6 Overview of Internet security <\/td>\n<\/tr>\n
16<\/td>\n7 Interested parties
7.1 General <\/td>\n<\/tr>\n
17<\/td>\n7.2 Users <\/td>\n<\/tr>\n
18<\/td>\n7.3 Coordinator and standardization organisations
7.4 \u200bGovernment authorities
7.5 \u200bLaw enforcement agencies
7.6 Internet service providers <\/td>\n<\/tr>\n
19<\/td>\n8 Internet security risk assessment and treatment
8.1 General
8.2 Threats <\/td>\n<\/tr>\n
20<\/td>\n8.3 Vulnerabilities
8.4 Attack vectors <\/td>\n<\/tr>\n
21<\/td>\n9 Security guidelines for the Internet
9.1 General <\/td>\n<\/tr>\n
22<\/td>\n9.2 Controls for Internet security
9.2.1 General
9.2.2 Policies for Internet security
9.2.3 Access control <\/td>\n<\/tr>\n
23<\/td>\n9.2.4 Education, awareness and training
9.2.5 Security incident management <\/td>\n<\/tr>\n
25<\/td>\n9.2.6 Asset management
9.2.7 Supplier management <\/td>\n<\/tr>\n
26<\/td>\n9.2.8 Business continuity over the Internet
9.2.9 Privacy protection over the Internet <\/td>\n<\/tr>\n
27<\/td>\n9.2.10 Vulnerability management <\/td>\n<\/tr>\n
28<\/td>\n9.2.11 Network management <\/td>\n<\/tr>\n
29<\/td>\n9.2.12 Protection against malware
9.2.13 Change management <\/td>\n<\/tr>\n
30<\/td>\n9.2.14 Identification of applicable legislation and compliance requirements
9.2.15 Use of cryptography
9.2.16 Application security for Internet-facing applications <\/td>\n<\/tr>\n
32<\/td>\n9.2.17 Endpoint device management
9.2.18 \u200bMonitoring <\/td>\n<\/tr>\n
33<\/td>\nAnnex A (informative) Cross-references between this document and ISO\/IEC 27002 <\/td>\n<\/tr>\n
35<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Cybersecurity. Guidelines for Internet security<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n38<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":434137,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-434134","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/434134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/434137"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=434134"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=434134"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=434134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}