{"id":349207,"date":"2024-10-20T00:35:27","date_gmt":"2024-10-20T00:35:27","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-15-30230399-dc\/"},"modified":"2024-10-26T00:14:55","modified_gmt":"2024-10-26T00:14:55","slug":"bsi-15-30230399-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-15-30230399-dc\/","title":{"rendered":"BSI 15\/30230399 DC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1\tScope
2\tNormative references
3\tTerms and definitions <\/td>\n<\/tr>\n
10<\/td>\n4\tSymbols and abbreviated terms
5\tMitigating identity related risk in managing identity information
5.1\tOverview
5.2\tRisk Assessment <\/td>\n<\/tr>\n
11<\/td>\n5.3\tAssurance in identity information
5.3.1\tGeneral
5.3.2\tIdentity proofing
5.3.3\tCredentials
5.3.4\tIdentity profile <\/td>\n<\/tr>\n
12<\/td>\n6\tIdentity information and identifiers
6.1\tOverview
6.2\tPolicy on accessing identity information
6.3\tIdentifiers
6.3.1\tGeneral <\/td>\n<\/tr>\n
13<\/td>\n6.3.2\tCategorization of identifier by the type of entity to which the identifier is linked
6.3.3\tCategorization of identifier by the nature of linking <\/td>\n<\/tr>\n
14<\/td>\n6.3.4\tCategorization of identifier by the grouping of entities
6.3.5\tManagement of identifiers
7\tAuditing identity information usage <\/td>\n<\/tr>\n
15<\/td>\n8\tControl objectives and controls
8.1\tGeneral
8.2\tContextual components for control
8.2.1\tEstablishing a system for identity management <\/td>\n<\/tr>\n
17<\/td>\n8.2.2\tEstablishing identity <\/td>\n<\/tr>\n
18<\/td>\n8.2.3\tManaging identity information <\/td>\n<\/tr>\n
19<\/td>\n8.3\tArchitectural components for control
8.3.1\tEstablishing an identity management system <\/td>\n<\/tr>\n
20<\/td>\n8.3.2\tControlling an identity management system <\/td>\n<\/tr>\n
22<\/td>\nAnnex\u00a0A (normative) Practice of managing identity information in a federation of identity management systems <\/td>\n<\/tr>\n
31<\/td>\nAnnex\u00a0B (normative) Privacy-respecting identity management scheme using attribute-based credentials <\/td>\n<\/tr>\n
38<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO\/IEC 24760-3. Information technology. Security techniques. A framework for identity management. Part 3. Practice<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2015<\/td>\n40<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":349216,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-349207","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/349207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/349216"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=349207"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=349207"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=349207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}