{"id":408375,"date":"2024-10-20T05:30:21","date_gmt":"2024-10-20T05:30:21","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-270702021\/"},"modified":"2024-10-26T10:01:03","modified_gmt":"2024-10-26T10:01:03","slug":"bs-iso-iec-270702021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-270702021\/","title":{"rendered":"BS ISO\/IEC 27070:2021"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Symbols and abbreviated terms <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 Functional view 5.1 Overview <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.2 Hardware layer components 5.2.1 General 5.2.2 Functional requirements of key components 5.2.3 Security requirements of key components <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.3 VMM layer components 5.3.1 Functional requirements of key components <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.3.2 Security requirements of key components <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.4 VM layer components <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.5 Cloud OS layer components 5.5.1 General 5.5.2 Functional requirements of key components 5.5.3 Security requirements of key components <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6 Activity view 6.1 General 6.2 Transitive trust 6.2.1 General <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.2.2 Transitive trust in host 6.2.3 Transitive trust in VMM 6.2.4 Transitive trust in VM 6.3 Integrity measurement <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.4 Remote attestation <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.5 Data protection 6.5.1 General 6.5.2 Data binding <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.5.3 Data sealing <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.6 vTM migration <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Annex A (informative) Relationship between activity and functional views <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Security techniques. Requirements for establishing virtualized roots of trust<\/b><\/p>\n |