{"id":418240,"date":"2024-10-20T06:20:05","date_gmt":"2024-10-20T06:20:05","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-23-30422722-dc-2023\/"},"modified":"2024-10-26T11:49:01","modified_gmt":"2024-10-26T11:49:01","slug":"bsi-23-30422722-dc-2023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-23-30422722-dc-2023\/","title":{"rendered":"BSI 23\/30422722 DC 2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions and abbreviated terms 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 3.2 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4 Overview 5 Requirements 5.1 Requirements for IoT device policies and documentation 5.1.1 Risk management <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.1.2 Information disclosure <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.1.3 Vulnerability disclosure and handling processes <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.2 Requirements for IoT device capabilities and operations 5.2.1 General 5.2.2 Configuration 5.2.3 Software reset <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.2.4 User data removal 5.2.5 Protection of data <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.2.6 Interface access <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.2.7 Software and firmware updates <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Annex\u20acA (informative) Risk management guidance <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 27402. Cybersecurity. IoT security and privacy. Device baseline requirements<\/b><\/p>\n |