{"id":409966,"date":"2024-10-20T05:38:10","date_gmt":"2024-10-20T05:38:10","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-tr-58952022\/"},"modified":"2024-10-26T10:21:28","modified_gmt":"2024-10-26T10:21:28","slug":"bsi-pd-iso-iec-tr-58952022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-tr-58952022\/","title":{"rendered":"BSI PD ISO\/IEC TR 5895:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Concepts 4.1 General <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2 Relationship with other International Standards 4.2.1 \u200bISO\/IEC 29147 – Vulnerability disclosure 4.2.2 \u200bISO\/IEC 30111 – Vulnerability handling processes <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4.2.3 Risk reduction effectiveness <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5 MPCVD scenarios 5.1 General 5.2 MPCVD led by the vendor-coordinator (the owner of the technology developed) \u2013 the \u201cmitigating vendor\u201d 5.3 MPCVD process in non-owner cases 6 MPCVD stakeholders 6.1 General 6.2 Vendor 6.2.1 Mitigating vendor <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.2.2 Dependent vendor 6.2.3 Mitigating vendor and coordination 6.3 Non-vendor coordinator 6.4 Reporters 6.5 Users 6.6 Product security incident response team (PSIRT) function 7 MPCVD life cycle 7.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7.2 \u200bPolicy development 7.2.1 Preparation 7.2.2 \u200bPolicy 7.3 Strategy development 7.3.1 Information sharing strategy 7.3.2 Disclosure strategy <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.4 Know your customers 7.5 Encrypted communication methods and conference calls 7.6 Processes and controls 8 MPCVD life cycle for each product 8.1 Product and user mapping 8.2 Component analysis <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 8.3 User analysis 9 MPCVD life cycle for each vulnerability 9.1 Receipt 9.2 \u200bVerification <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 9.3 Remediation development 9.4 Release 9.5 Post-release 9.6 Embargo period <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 10 Information exchange <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 11 Disclosure 12 Use case for hardware and further considerations <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Cybersecurity. Multi-party coordinated vulnerability disclosure and handling<\/b><\/p>\n |