{"id":439180,"date":"2024-10-20T08:07:38","date_gmt":"2024-10-20T08:07:38","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pas-1852023\/"},"modified":"2024-10-26T15:13:52","modified_gmt":"2024-10-26T15:13:52","slug":"bsi-pas-1852023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pas-1852023\/","title":{"rendered":"BSI PAS 185:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
3<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | 0 Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 2 Normative references <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 3 Terms, definitions and abbreviations <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4 The security-minded approach <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5 Understanding the security context <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6 Developing a security strategy <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7 Developing a security management plan <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 8 Security breach\/incident management plan (SB\/IMP) <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 9 Sharing and publication of data and information <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 10 Connected place projects <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Connected places. Establishing and implementing a security-minded approach. Specification<\/b><\/p>\n |