{"id":401530,"date":"2024-10-20T04:56:46","date_gmt":"2024-10-20T04:56:46","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-22-30385399-dc-2022\/"},"modified":"2024-10-26T08:45:08","modified_gmt":"2024-10-26T08:45:08","slug":"bsi-22-30385399-dc-2022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-22-30385399-dc-2022\/","title":{"rendered":"BSI 22\/30385399 DC 2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions
4 Security management and planning <\/td>\n<\/tr>\n
10<\/td>\n5 The components of the security plan
5.1 General
5.2 Scope of the security plan <\/td>\n<\/tr>\n
11<\/td>\n5.3 Governance
5.3.1 General
5.3.2 Security objectives
5.3.3 \u200bLeadership
5.3.4 Legal and regulatory compliance
5.3.5 Roles, accountabilities, and responsibilities <\/td>\n<\/tr>\n
12<\/td>\n5.3.6 Communication
5.3.7 Documented information
5.3.8 Reporting, review, and continuous improvement
5.4 Security risk environment <\/td>\n<\/tr>\n
13<\/td>\n5.5 Security risk management
5.5.1 General
5.5.2 \u200bAssessment
5.5.3 Treatment <\/td>\n<\/tr>\n
14<\/td>\n5.5.4 Communication and consultation
5.5.5 \u200bMonitoring and review
5.5.6 Documentation Management
5.6 Security controls process
5.6.1 General
5.6.2 Selection
5.6.3 Implementation, testing and evaluation <\/td>\n<\/tr>\n
15<\/td>\n5.6.4 \u200bMonitoring activities
5.6.5 Determining effectiveness
5.7 Security controls
5.7.1 General <\/td>\n<\/tr>\n
16<\/td>\n5.7.2 Levels of protection
5.7.3 Procedures for security controls
5.7.4 Operational level controls and treatments <\/td>\n<\/tr>\n
17<\/td>\n5.7.5 Contingency planning for low likelihood and unforeseen situations
5.7.6 Timelines for security activities
5.7.7 Acceptance level for residual security risk
5.8 \u200bEvaluation <\/td>\n<\/tr>\n
18<\/td>\n5.9 Improvement <\/td>\n<\/tr>\n
19<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO 22342. Security and resilience. Protective security. Guidelines for the development of a security plan for an organization<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n19<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":401539,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[83,2641],"product_tag":[],"class_list":{"0":"post-401530","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-03-100-01","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/401530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/401539"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=401530"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=401530"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=401530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}