{"id":450663,"date":"2024-10-20T09:13:02","date_gmt":"2024-10-20T09:13:02","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-274022023-2024\/"},"modified":"2024-10-26T17:10:37","modified_gmt":"2024-10-26T17:10:37","slug":"bs-iso-iec-274022023-2024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-274022023-2024\/","title":{"rendered":"BS ISO\/IEC 27402:2023 2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions and abbreviated terms 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 3.2 Abbreviated terms 4 Overview <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5 Requirements 5.1 Requirements for IoT device policies and documentation 5.1.1 Risk management <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.1.2 Information disclosure <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.1.3 Vulnerability disclosure and handling processes 5.2 Requirements for IoT device capabilities and operations 5.2.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.2.2 Configuration 5.2.3 Software reset <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.2.4 User data removal 5.2.5 Protection of data <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.2.6 Interface access <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.2.7 Software and firmware updates <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.2.8 User notifications <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Annex A (informative) Risk management guidance <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Cybersecurity. IoT security and privacy. Device baseline requirements<\/b><\/p>\n |