Shopping Cart

No products in the cart.

BSI 22/30422725 DC 2022

$24.66

BS EN ISO/IEC 27040. Information technology. Security techniques. Storage security

Published By Publication Date Number of Pages
BSI 2022 101
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
7 Foreword
8 Introduction
9 1 Scope
2 Normative references
3 Terms and definitions
3.1 General
10 3.2 Terms relating to storage technology
12 3.3 Terms relating to sanitization
13 3.4 Terms relating to availability
3.5 Terms relating to security and cryptography
14 3.6 Terms relating to archives and repositories
16 3.7 Miscellaneous terms
4 Symbols and abbreviated terms
20 5 Structure of this document
5.1 Clauses
5.2 Controls
21 6 Overview and concepts
6.1 General
6.2 Storage concepts
22 6.3 Introduction to storage security
25 6.4 Storage security risks
6.4.1 Background
6.4.2 Data breaches
26 6.4.3 Data corruption or destruction
27 6.4.4 Temporary or permanent loss of access/availability
6.4.5 Failure to meet statutory, regulatory, or legal requirements
7 Organizational controls for storage
7.1 General
28 7.2 Align storage and policy
29 7.3 Business continuity management
30 7.4 Compliance
31 8 People controls for storage
32 9 Physical controls for storage
9.1 General
9.2 Physically secure storage
33 9.3 Protect physical interfaces to storage
9.4 Isolation of storage systems
34 10 Technological controls for storage
10.1 General
35 10.2 Design and implementation of storage security
10.2.1 General
10.2.2 Storage security design principles
37 10.2.3 Storage system quality attributes
40 10.2.4 Retention, preservation, and disposal of data
10.3 Storage systems security
10.3.1 System hardening
41 10.3.2 Security auditing, accounting, and monitoring
44 10.3.3 Storage vulnerability management
10.4 Storage management
10.4.1 Background
45 10.4.2 Authentication and authorization
46 10.4.3 Secure the management interfaces
48 10.5 Data confidentiality
10.5.1 General
49 10.5.2 Encryption and key management issues
10.5.3 Encryption of storage
52 10.5.4 Encrypting transferred data
53 10.5.5 Encrypting data at rest
54 10.6 Storage sanitization
10.6.1 General
55 10.6.2 Selection of sanitization methods
56 10.6.3 Media-based sanitization
10.6.4 Logical sanitization
57 10.6.5 Cryptographic erase
58 10.6.6 Verification of storage sanitization
59 10.6.7 Proof of sanitization
60 10.7 Direct Attached Storage (DAS)
10.8 Storage networking
10.8.1 Background
61 10.8.2 Storage Area Networks (SAN)
66 10.8.3 Network Attached Storage (NAS) protocols
68 10.9 Block-based storage
10.9.1 Fibre Channel (FC) storage
69 10.9.2 IP storage
10.10 File-based storage
10.10.1 General
70 10.10.2 NFS-based NAS
10.10.3 SMB-based NAS
71 10.11 Cloud computing storage
10.11.1 Securing cloud computing storage
72 10.11.2 CDMI security
73 10.12 Object-based storage
10.13 Data reductions
74 10.14 Data protection and recovery
10.14.1 General
75 10.14.2 Storage backups
10.14.3 Storage replication
76 10.14.4 Continuous data protection (CDP)
10.15 Data archives and repositories
10.15.1 General
10.15.2 Data Archives
80 10.15.3 Data Repositories
81 10.16 Virtualization
10.16.1 Storage virtualization
82 10.16.2 Storage for virtualized systems
83 10.17 Secure multi-tenancy
84 10.18 Secure autonomous data movement
86 Annex€A (informative) Storage security controls summary
94 Bibliography
98 Index
BSI 22/30422725 DC 2022
$24.66