{"id":349207,"date":"2024-10-20T00:35:27","date_gmt":"2024-10-20T00:35:27","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-15-30230399-dc\/"},"modified":"2024-10-26T00:14:55","modified_gmt":"2024-10-26T00:14:55","slug":"bsi-15-30230399-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-15-30230399-dc\/","title":{"rendered":"BSI 15\/30230399 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1\tScope 2\tNormative references 3\tTerms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4\tSymbols and abbreviated terms 5\tMitigating identity related risk in managing identity information 5.1\tOverview 5.2\tRisk Assessment <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5.3\tAssurance in identity information 5.3.1\tGeneral 5.3.2\tIdentity proofing 5.3.3\tCredentials 5.3.4\tIdentity profile <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6\tIdentity information and identifiers 6.1\tOverview 6.2\tPolicy on accessing identity information 6.3\tIdentifiers 6.3.1\tGeneral <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.3.2\tCategorization of identifier by the type of entity to which the identifier is linked 6.3.3\tCategorization of identifier by the nature of linking <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.3.4\tCategorization of identifier by the grouping of entities 6.3.5\tManagement of identifiers 7\tAuditing identity information usage <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 8\tControl objectives and controls 8.1\tGeneral 8.2\tContextual components for control 8.2.1\tEstablishing a system for identity management <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 8.2.2\tEstablishing identity <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 8.2.3\tManaging identity information <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8.3\tArchitectural components for control 8.3.1\tEstablishing an identity management system <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8.3.2\tControlling an identity management system <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Annex\u00a0A (normative) Practice of managing identity information in a federation of identity management systems <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex\u00a0B (normative) Privacy-respecting identity management scheme using attribute-based credentials <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 24760-3. Information technology. Security techniques. A framework for identity management. Part 3. Practice<\/b><\/p>\n |