{"id":372464,"date":"2024-10-20T02:29:24","date_gmt":"2024-10-20T02:29:24","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-tr-11633-22021\/"},"modified":"2024-10-26T04:20:37","modified_gmt":"2024-10-26T04:20:37","slug":"bsi-pd-iso-tr-11633-22021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-tr-11633-22021\/","title":{"rendered":"BSI PD ISO\/TR 11633-2:2021"},"content":{"rendered":"
This document gives a guideline for implementation of an ISMS by showing practical examples of risk analysis on remote maintenance services (RMS) for information systems in healthcare facilities (HCFs) as provided by vendors of medical devices or health information systems in order to protect both sides\u2019 information assets (primarily the information system itself and personal health data) in a safe and efficient (i.e. economical) manner.<\/p>\n
This document consists of:<\/p>\n
application of ISMS to RMS;<\/p>\n<\/li>\n
security management measures for RMS;<\/p>\n<\/li>\n
an example of the evaluation and effectiveness based on the \u201c controls\u201d defined in the ISMS.<\/p>\n<\/li>\n<\/ul>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Application of ISMS to remote maintenance services 4.1 Overview <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2 Compliance scope 4.3 Security policy <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4.4 Assessing risks 4.5 Risks to be managed <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4.6 Identification of risks that are not described in this document 4.7 Treating risks <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5 Security management measures for remote maintenance services 6 Approving residual risks <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7 Security audit 7.1 Security audit of remote maintenance services 7.2 Recommendation of security audit by third parties <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | Annex A (informative) Example of risk assessment in remote maintenance services <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Health informatics. Information security management for remote maintenance of medical devices and medical information systems – Implementation of an information security management system (ISMS)<\/b><\/p>\n |