{"id":409966,"date":"2024-10-20T05:38:10","date_gmt":"2024-10-20T05:38:10","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-tr-58952022\/"},"modified":"2024-10-26T10:21:28","modified_gmt":"2024-10-26T10:21:28","slug":"bsi-pd-iso-iec-tr-58952022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-tr-58952022\/","title":{"rendered":"BSI PD ISO\/IEC TR 5895:2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions
4 Concepts
4.1 General <\/td>\n<\/tr>\n
11<\/td>\n4.2 Relationship with other International Standards
4.2.1 \u200bISO\/IEC 29147 – Vulnerability disclosure
4.2.2 \u200bISO\/IEC 30111 – Vulnerability handling processes <\/td>\n<\/tr>\n
12<\/td>\n4.2.3 Risk reduction effectiveness <\/td>\n<\/tr>\n
13<\/td>\n5 MPCVD scenarios
5.1 General
5.2 MPCVD led by the vendor-coordinator (the owner of the technology developed) \u2013 the \u201cmitigating vendor\u201d
5.3 MPCVD process in non-owner cases
6 MPCVD stakeholders
6.1 General
6.2 Vendor
6.2.1 Mitigating vendor <\/td>\n<\/tr>\n
14<\/td>\n6.2.2 Dependent vendor
6.2.3 Mitigating vendor and coordination
6.3 Non-vendor coordinator
6.4 Reporters
6.5 Users
6.6 Product security incident response team (PSIRT) function
7 MPCVD life cycle
7.1 General <\/td>\n<\/tr>\n
15<\/td>\n7.2 \u200bPolicy development
7.2.1 Preparation
7.2.2 \u200bPolicy
7.3 Strategy development
7.3.1 Information sharing strategy
7.3.2 Disclosure strategy <\/td>\n<\/tr>\n
16<\/td>\n7.4 Know your customers
7.5 Encrypted communication methods and conference calls
7.6 Processes and controls
8 MPCVD life cycle for each product
8.1 Product and user mapping
8.2 Component analysis <\/td>\n<\/tr>\n
17<\/td>\n8.3 User analysis
9 MPCVD life cycle for each vulnerability
9.1 Receipt
9.2 \u200bVerification <\/td>\n<\/tr>\n
18<\/td>\n9.3 Remediation development
9.4 Release
9.5 Post-release
9.6 Embargo period <\/td>\n<\/tr>\n
19<\/td>\n10 Information exchange <\/td>\n<\/tr>\n
20<\/td>\n11 Disclosure
12 Use case for hardware and further considerations <\/td>\n<\/tr>\n
22<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Cybersecurity. Multi-party coordinated vulnerability disclosure and handling<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n24<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":409972,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-409966","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/409966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/409972"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=409966"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=409966"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=409966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}