{"id":464801,"date":"2024-10-20T10:37:00","date_gmt":"2024-10-20T10:37:00","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-275542024\/"},"modified":"2024-10-26T19:34:29","modified_gmt":"2024-10-26T19:34:29","slug":"bs-iso-iec-275542024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-275542024\/","title":{"rendered":"BS ISO\/IEC 27554:2024"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
11<\/td>\n4 Principles
5 Framework
5.1 General
5.2 Leadership and commitment
5.3 Integration <\/td>\n<\/tr>\n
12<\/td>\n5.4 Design
5.5 Implementation
5.6 Evaluation
5.7 Improvement
6 Process
6.1 General
6.2 Communication and consultation
6.3 Scope, context and criteria
6.4 Risk assessment <\/td>\n<\/tr>\n
13<\/td>\n6.5 Risk treatment
6.6 Monitoring and review
6.7 Recording and reporting
7 Identity-related context establishment
7.1 General
7.2 Actors
7.2.1 Subscribers\/Actors
7.2.2 Administrators
7.3 Types of personal data
7.4 Policies and regulations
7.5 Service and transaction scope <\/td>\n<\/tr>\n
14<\/td>\n8 Identity-related risk assessment
9 Identity-related risk identification <\/td>\n<\/tr>\n
15<\/td>\n10 Identity-related risk analysis
10.1 General
10.2 Affected parties
10.3 Identity theft or fabrication <\/td>\n<\/tr>\n
16<\/td>\n10.4 Categories of consequences of identity-related risk
10.5 Risk impact assessment <\/td>\n<\/tr>\n
17<\/td>\n11 Identity-related risk evaluation
12 Identity-related risk treatment <\/td>\n<\/tr>\n
18<\/td>\nAnnex A (informative) Standards related to identity-management risk assessment <\/td>\n<\/tr>\n
21<\/td>\nAnnex B (informative) Risk impact assessment <\/td>\n<\/tr>\n
26<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information security, cybersecurity and privacy protection. Application of ISO 31000 for assessment of identity-related risk<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2024<\/td>\n28<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":464810,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-464801","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/464801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/464810"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=464801"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=464801"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=464801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}