{"id":350602,"date":"2024-10-20T00:43:08","date_gmt":"2024-10-20T00:43:08","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-301112020\/"},"modified":"2024-10-26T00:31:02","modified_gmt":"2024-10-26T00:31:02","slug":"bs-en-iso-iec-301112020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-301112020\/","title":{"rendered":"BS EN ISO\/IEC 30111:2020"},"content":{"rendered":"
This document provides requirements and recommendations for how to process and remediate reported potential vulnerabilities in a product or service.<\/p>\n
This document is applicable to vendors involved in handling vulnerabilities.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | European foreword Endorsement notice <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Relationships to other International Standards 5.1 ISO\/IEC 29147 <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 5.2 ISO\/IEC 27034 (all parts) 5.3 ISO\/IEC 27036-3 <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5.4 ISO\/IEC 15408-3 6 Policy and organizational framework 6.1 General 6.2 Leadership 6.2.1 Leadership and commitment 6.2.2 Policy <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6.2.3 Organizational roles, responsibilities, and authorities 6.3 Vulnerability handling policy development 6.4 Organizational framework development <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.5 Vendor CSIRT or PSIRT 6.5.1 General 6.5.2 PSIRT mission 6.5.3 PSIRT responsibilities <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.5.4 Staff capabilities 6.6 Responsibilities of the product business division <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.7 Responsibilities of customer support and public relations 6.8 Legal consultation 7 Vulnerability handling process 7.1 Vulnerability handling phases 7.1.1 General <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.1.2 Preparation 7.1.3 Receipt <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.1.4 Verification <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.1.5 Remediation development 7.1.6 Release 7.1.7 Post-release <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.2 Process monitoring 7.3 Confidentiality of vulnerability information 8 Supply chain considerations <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Security techniques. Vulnerability handling processes<\/b><\/p>\n |