{"id":435614,"date":"2024-10-20T07:50:35","date_gmt":"2024-10-20T07:50:35","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-27036-32023-tc\/"},"modified":"2024-10-26T14:51:18","modified_gmt":"2024-10-26T14:51:18","slug":"bs-iso-iec-27036-32023-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-27036-32023-tc\/","title":{"rendered":"BS ISO\/IEC 27036-3:2023 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
68<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 4 Structure 5 Key concepts 5.1 Business case for hardware, software, and services supply chain security <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 5.2 Hardware, software, and services supply chain risks and associated threats 5.3 Acquirer and supplier relationship types <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 5.4 Organizational capability 5.5 System life cycle processes <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 5.6 ISMS processes in relation to system life cycle processes <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 5.7 ISMS controls in relation to hardware, software, and services supply chain security 5.8 Essential hardware, software, and services supply chain security practices <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 6 Hardware, software, and services supply chain security in life cycle processes 6.1 Agreement processes 6.1.1 Acquisition process <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 6.1.2 Supply process <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 6.2 Organizational project-enabling processes 6.2.1 Life cycle model management process 6.2.2 Infrastructure management process <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 6.2.3 Project portfolio management process 6.2.4 Human resource management process <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 6.2.5 Quality management process 6.2.6 Knowledge management process 6.3 Technical management processes 6.3.1 Project planning process <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 6.3.2 Project assessment and control process 6.3.3 Decision management process 6.3.4 Risk management process <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 6.3.5 Configuration management process <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 6.3.6 Information management process 6.3.7 Measurement process 6.3.8 Quality assurance process 6.4 Technical processes 6.4.1 Business or mission analysis process 6.4.2 Stakeholder needs and requirements definition process <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 6.4.3 System requirements definition process <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 6.4.4 System architecture definition process <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 6.4.5 Design definition process 6.4.6 System analysis process 6.4.7 Implementation process <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 6.4.8 Integration process 6.4.9 \u200bVerification process <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 6.4.10 Transition process <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 6.4.11 Validation process <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 6.4.12 Operation process 6.4.13 Maintenance process <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 6.4.14 Disposal process <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | Annex A (informative) Correspondence between the controls in ISO\/IEC 27002 and this document <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | Annex B (informative) Essential elements of a software bill of materials <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Cybersecurity. Supplier relationships – Guidelines for information and communication technology supply chain security<\/b><\/p>\n |