{"id":350602,"date":"2024-10-20T00:43:08","date_gmt":"2024-10-20T00:43:08","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-301112020\/"},"modified":"2024-10-26T00:31:02","modified_gmt":"2024-10-26T00:31:02","slug":"bs-en-iso-iec-301112020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-301112020\/","title":{"rendered":"BS EN ISO\/IEC 30111:2020"},"content":{"rendered":"

This document provides requirements and recommendations for how to process and remediate reported potential vulnerabilities in a product or service.<\/p>\n

This document is applicable to vendors involved in handling vulnerabilities.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
4<\/td>\nEuropean foreword
Endorsement notice <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated terms
5 Relationships to other International Standards
5.1 ISO\/IEC 29147 <\/td>\n<\/tr>\n
10<\/td>\n5.2 ISO\/IEC 27034 (all parts)
5.3 ISO\/IEC 27036-3 <\/td>\n<\/tr>\n
11<\/td>\n5.4 ISO\/IEC 15408-3
6 Policy and organizational framework
6.1 General
6.2 Leadership
6.2.1 Leadership and commitment
6.2.2 Policy <\/td>\n<\/tr>\n
12<\/td>\n6.2.3 Organizational roles, responsibilities, and authorities
6.3 Vulnerability handling policy development
6.4 Organizational framework development <\/td>\n<\/tr>\n
13<\/td>\n6.5 Vendor CSIRT or PSIRT
6.5.1 General
6.5.2 PSIRT mission
6.5.3 PSIRT responsibilities <\/td>\n<\/tr>\n
14<\/td>\n6.5.4 Staff capabilities
6.6 Responsibilities of the product business division <\/td>\n<\/tr>\n
15<\/td>\n6.7 Responsibilities of customer support and public relations
6.8 Legal consultation
7 Vulnerability handling process
7.1 Vulnerability handling phases
7.1.1 General <\/td>\n<\/tr>\n
16<\/td>\n7.1.2 Preparation
7.1.3 Receipt <\/td>\n<\/tr>\n
17<\/td>\n7.1.4 Verification <\/td>\n<\/tr>\n
18<\/td>\n7.1.5 Remediation development
7.1.6 Release
7.1.7 Post-release <\/td>\n<\/tr>\n
19<\/td>\n7.2 Process monitoring
7.3 Confidentiality of vulnerability information
8 Supply chain considerations <\/td>\n<\/tr>\n
21<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Security techniques. Vulnerability handling processes<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2020<\/td>\n22<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":350611,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-350602","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/350602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/350611"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=350602"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=350602"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=350602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}