{"id":462588,"date":"2024-10-20T10:23:01","date_gmt":"2024-10-20T10:23:01","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-274032024\/"},"modified":"2024-10-26T19:15:39","modified_gmt":"2024-10-26T19:15:39","slug":"bs-iso-iec-274032024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-274032024\/","title":{"rendered":"BS ISO\/IEC 27403:2024"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
10<\/td>\n4 Abbreviated terms
5 Overview
5.1 General
5.2 Features <\/td>\n<\/tr>\n
12<\/td>\n5.3 Stakeholders
5.4 Life cycles <\/td>\n<\/tr>\n
13<\/td>\n5.5 Reference model <\/td>\n<\/tr>\n
16<\/td>\n5.6 Security and privacy dimensions
6 Guidelines for risk assessment
6.1 General <\/td>\n<\/tr>\n
17<\/td>\n6.2 Sources of security risks
6.2.1 Security risks for service sub-systems <\/td>\n<\/tr>\n
18<\/td>\n6.2.2 Security risks for IoT-domotics gateway <\/td>\n<\/tr>\n
20<\/td>\n6.2.3 Security risks for IoT-domotics devices and physical entities <\/td>\n<\/tr>\n
21<\/td>\n6.2.4 Security risks for networks
6.3 Sources of privacy risks
6.3.1 Privacy risks for service sub-systems <\/td>\n<\/tr>\n
22<\/td>\n6.3.2 Privacy risks for IoT-domotics gateway <\/td>\n<\/tr>\n
24<\/td>\n6.3.3 Privacy risks for IoT-domotics devices and physical entitles
6.3.4 Privacy risks for networks <\/td>\n<\/tr>\n
25<\/td>\n7 Security and privacy controls
7.1 Principles
7.1.1 General
7.1.2 Different levels of security for different services
7.1.3 Easy security settings for users
7.1.4 Failsafe domotics devices
7.1.5 Restricted access to content services
7.1.6 Consideration for children
7.1.7 Scenario-specific privacy preferences <\/td>\n<\/tr>\n
26<\/td>\n7.2 Security controls
7.2.1 \u200bPolicy for IoT-domotics security
7.2.2 Organization of IoT-domotics security
7.2.3 Asset management
7.2.4 Equipment and assets located outside physical secured areas
7.2.5 Secure disposal or re-use of equipment <\/td>\n<\/tr>\n
27<\/td>\n7.2.6 Learning from security incidents
7.2.7 Secure IoT-domotics system engineering principles
7.2.8 Secure development environment and procedures <\/td>\n<\/tr>\n
28<\/td>\n7.2.9 Security of IoT-domotics systems in support of safety
7.2.10 Security in connecting varied IoT-domotics devices
7.2.11 \u200bVerification of IoT-domotics devices and systems design
7.2.12 \u200bMonitoring and logging
7.2.13 Protection of logs
7.2.14 Use of suitable networks for the IoT-domotics systems
7.2.15 Secure settings and configurations in delivery of IoT-domotics devices and services <\/td>\n<\/tr>\n
29<\/td>\n7.2.16 User and device authentication
7.2.17 Provision of software and firmware updates
7.2.18 Sharing vulnerability information
7.2.19 Security measures adapted to the life cycle of IoT-domotics system and services
7.2.20 Guidance for IoT-domotics users on the proper use of IoT-domotics devices and services <\/td>\n<\/tr>\n
30<\/td>\n7.2.21 Determination of security roles for stakeholders
7.2.22 Management of vulnerable devices
7.2.23 Management of supplier relationships in IoT-domotics security
7.2.24 Secure disclosure of Information regarding security of IoT-domotics devices
7.3 Privacy controls
7.3.1 Prevention of privacy invasive events
7.3.2 IoT-domotics privacy by default <\/td>\n<\/tr>\n
31<\/td>\n7.3.3 Provision of privacy notice
7.3.4 \u200bVerification of IoT-domotics functionality
7.3.5 Consideration of IoT-domotics users
7.3.6 Management of IoT-domotics privacy controls <\/td>\n<\/tr>\n
32<\/td>\n7.3.7 Unique device identity
7.3.8 Fail-safe authentication
7.3.9 Minimization of indirect data collection
7.3.10 Communication of privacy preferences
7.3.11 \u200bVerification of automated decision
7.3.12 Accountability for stakeholders
7.3.13 Unlinkability of PII <\/td>\n<\/tr>\n
33<\/td>\n7.3.14 Sharing information on PII protection measures of IoT-domotics devices <\/td>\n<\/tr>\n
34<\/td>\nAnnex A (informative) Use cases of IoT-domotics <\/td>\n<\/tr>\n
39<\/td>\nAnnex B (informative) Security and privacy concerns from stakeholders <\/td>\n<\/tr>\n
43<\/td>\nAnnex C (informative) Security and privacy responsibilities of stakeholders <\/td>\n<\/tr>\n
45<\/td>\nAnnex D (informative) Security measures for different types of IoT-domotics devices <\/td>\n<\/tr>\n
47<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Cybersecurity. IoT security and privacy. Guidelines for IoT-domotics<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2024<\/td>\n48<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":462598,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-462588","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/462588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/462598"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=462588"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=462588"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=462588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}