{"id":464801,"date":"2024-10-20T10:37:00","date_gmt":"2024-10-20T10:37:00","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-275542024\/"},"modified":"2024-10-26T19:34:29","modified_gmt":"2024-10-26T19:34:29","slug":"bs-iso-iec-275542024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-275542024\/","title":{"rendered":"BS ISO\/IEC 27554:2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Principles 5 Framework 5.1 General 5.2 Leadership and commitment 5.3 Integration <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.4 Design 5.5 Implementation 5.6 Evaluation 5.7 Improvement 6 Process 6.1 General 6.2 Communication and consultation 6.3 Scope, context and criteria 6.4 Risk assessment <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.5 Risk treatment 6.6 Monitoring and review 6.7 Recording and reporting 7 Identity-related context establishment 7.1 General 7.2 Actors 7.2.1 Subscribers\/Actors 7.2.2 Administrators 7.3 Types of personal data 7.4 Policies and regulations 7.5 Service and transaction scope <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 8 Identity-related risk assessment 9 Identity-related risk identification <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 10 Identity-related risk analysis 10.1 General 10.2 Affected parties 10.3 Identity theft or fabrication <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 10.4 Categories of consequences of identity-related risk 10.5 Risk impact assessment <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 11 Identity-related risk evaluation 12 Identity-related risk treatment <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Annex A (informative) Standards related to identity-management risk assessment <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Annex B (informative) Risk impact assessment <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Application of ISO 31000 for assessment of identity-related risk<\/b><\/p>\n |