{"id":401530,"date":"2024-10-20T04:56:46","date_gmt":"2024-10-20T04:56:46","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-22-30385399-dc-2022\/"},"modified":"2024-10-26T08:45:08","modified_gmt":"2024-10-26T08:45:08","slug":"bsi-22-30385399-dc-2022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-22-30385399-dc-2022\/","title":{"rendered":"BSI 22\/30385399 DC 2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Security management and planning <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 5 The components of the security plan 5.1 General 5.2 Scope of the security plan <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5.3 Governance 5.3.1 General 5.3.2 Security objectives 5.3.3 \u200bLeadership 5.3.4 Legal and regulatory compliance 5.3.5 Roles, accountabilities, and responsibilities <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.3.6 Communication 5.3.7 Documented information 5.3.8 Reporting, review, and continuous improvement 5.4 Security risk environment <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.5 Security risk management 5.5.1 General 5.5.2 \u200bAssessment 5.5.3 Treatment <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.5.4 Communication and consultation 5.5.5 \u200bMonitoring and review 5.5.6 Documentation Management 5.6 Security controls process 5.6.1 General 5.6.2 Selection 5.6.3 Implementation, testing and evaluation <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.6.4 \u200bMonitoring activities 5.6.5 Determining effectiveness 5.7 Security controls 5.7.1 General <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.7.2 Levels of protection 5.7.3 Procedures for security controls 5.7.4 Operational level controls and treatments <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.7.5 Contingency planning for low likelihood and unforeseen situations 5.7.6 Timelines for security activities 5.7.7 Acceptance level for residual security risk 5.8 \u200bEvaluation <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.9 Improvement <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO 22342. Security and resilience. Protective security. Guidelines for the development of a security plan for an organization<\/b><\/p>\n |