BS ISO/IEC 27561:2024
$167.15
Information security, cybersecurity and privacy protection. Privacy operationalisation model and method for engineering (POMME)
Published By | Publication Date | Number of Pages |
BSI | 2024 | 38 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
15 | 4 Symbols and abbreviated terms 5 Context of privacy operationalization 5.1 General 5.2 Privacy engineering viewpoint |
16 | 5.3 Privacy engineering operationalization model 5.4 Privacy engineering operationalization method 5.5 POMME processes overview |
17 | 5.6 Privacy and security |
18 | 6 Initial information inventory process 6.1 Purpose 6.2 Outcomes 6.3 Define and describe the TOA |
19 | 6.4 Participant and information source identification 6.5 Systems and processes identification 6.6 Domains and domain owners identification |
20 | 6.7 Intra-domain roles and responsibilities identification 6.8 Touch points identification 6.9 Data flows identification 6.10 PII identification |
21 | 7 Privacy controls, privacy control requirements, capabilities, risk assessment and iteration process 7.1 Purpose 7.2 Outcomes |
22 | 7.3 Privacy control specification 7.4 Privacy control requirement specification 7.5 Capabilities specification |
23 | 7.6 Risk assessment 7.7 Iteration |
24 | 8 Privacy capabilities 8.1 Capabilities overview |
25 | 8.2 Capability details and associated functions 8.2.1 Core policy capabilities |
26 | 8.2.2 Privacy assurance capabilities 8.2.3 Presentation and lifecycle capabilities |
27 | Annex A (informative) Mapping of the privacy principles from ISO/IEC 29100 to POMME capabilities |
28 | Annex B (informative) Lifecycle process example involving a PII controller and a solution provider |
31 | Annex C (informative) POMME capability functions and mechanisms in a consumer application use case |
36 | Bibliography |