{"id":499968,"date":"2024-11-05T13:17:53","date_gmt":"2024-11-05T13:17:53","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/as-iso-iec-27035-22017\/"},"modified":"2024-11-05T13:17:53","modified_gmt":"2024-11-05T13:17:53","slug":"as-iso-iec-27035-22017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/as\/as-iso-iec-27035-22017\/","title":{"rendered":"AS ISO\/IEC 27035.2:2017"},"content":{"rendered":"

This part of ISO\/IEC 27035 provides the guidelines to plan and prepare for incident response. The guidelines are based on the \u201cPlan and Prepare\u201d phase and the \u201cLessons Learned\u201d phase of the \u201cInformation security incident management phases\u201d model presented in ISO\/IEC 27035-1.
The major points within the \u201cPlan and Prepare\u201d phase include the following:
– information security incident management policy and commitment of top management;
– information security policies, including those relating to risk management, updated at both
corporate level and system, service and network levels;
– information security incident management plan;
– incident response team (IRT) establishment;
– establish relationships and connections with internal and external organizations;
– technical and other support (including organizational and operational support);
– information security incident management awareness briefings and training;
– information security incident management plan testing.
The principles given in this part of ISO\/IEC 27035 are generic and intended to be applicable to all organizations, regardless of type, size or nature. Organizations can adjust the guidance given in this part of ISO\/IEC 27035 according to their type, size and nature of business in relation to the information security risk situation. This part of ISO\/IEC 27035 is also applicable to external organizations providing information security incident management services.<\/p>\n","protected":false},"excerpt":{"rendered":"

Information technology – Security techniques – Information security incident management – Guidelines to plan and prepare for incident response<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
AS<\/b><\/a><\/td>\n2017-05-11<\/td>\n69<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":499983,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[83,656,2633],"product_tag":[],"class_list":{"0":"post-499968","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-03-100-01","7":"product_cat-35-030","8":"product_cat-as","10":"first","11":"instock","12":"sold-individually","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/499968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/499983"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=499968"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=499968"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=499968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}