{"id":453575,"date":"2024-10-20T09:31:01","date_gmt":"2024-10-20T09:31:01","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-22237-62024\/"},"modified":"2024-10-26T17:39:07","modified_gmt":"2024-10-26T17:39:07","slug":"bs-iso-iec-22237-62024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-22237-62024\/","title":{"rendered":"BS ISO\/IEC 22237-6:2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 3 Terms, definitions and abbreviated terms 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3.2 Abbreviated terms 4 Conformance 5 Physical security 5.1 General <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.2 Risk analysis and management <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.3 Designation of data centre spaces: Protection Classes 6 Protection against unauthorized access 6.1 General 6.1.1 Data centre configuration 6.1.2 Protection Classes <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.1.3 Protection Classes of specific infrastructures 6.1.4 Levels for access control 6.2 Access to the data centre premises 6.2.1 Premises with external physical barriers <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.2.2 Premises without external physical barriers <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.2.3 Roofs 6.2.4 Access routes <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.2.5 Parking 6.2.6 Employees and visitors <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.2.7 Pathways 6.2.8 Cabinets, racks and frames 6.3 Implementation 6.3.1 Protection Class 1 <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.3.2 Protection Class 2 <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.3.3 Protection Class 3 6.3.4 Protection Class 4 <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7 Protection against intrusion to data centre spaces 7.1 General 7.2 Level for the detection of intrusion <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.3 Implementation 7.3.1 Protection Class 1 7.3.2 Protection Class 2 <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.3.3 Protection Class 3 <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.3.4 Protection Class 4 8 Protection against internal fire events (fire events igniting within data centre spaces) 8.1 General 8.1.1 Protection Classes <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 8.1.2 Fire compartments and barriers <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 8.1.3 Fire detection and fire alarm systems 8.1.4 Fixed firefighting systems <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 8.1.5 Portable firefighting equipment 8.2 Implementation 8.2.1 Protection Class 1 8.2.2 Protection Class 2 8.2.3 Protection Class 3 8.2.4 Protection Class 4 9 Protection against internal environmental events (other than fire within data centre spaces) 9.1 General <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 9.2 Implementation 9.2.1 Protection Class 1 9.2.2 Protection Class 2 9.2.3 Protection Class 3 <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 9.2.4 Protection Class 4 10 Protection against external environmental events (events outside the data centre spaces) 10.1 General <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 10.2 Implementation 10.2.1 Protection Class 1 10.2.2 Protection Class 2 <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 10.2.3 Protection Class 3 11 Systems to prevent unauthorized access and intrusion 11.1 General <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 11.2 Technology 11.2.1 Security lighting 11.2.2 Video surveillance systems <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 11.2.3 Intruder and holdup alarm systems 11.2.4 Access control systems <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 11.2.5 Event and alarm monitoring <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Annex A (informative) Pressure relief: additional information <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Data centre facilities and infrastructures – Security systems<\/b><\/p>\n |