{"id":515115,"date":"2024-11-05T14:33:31","date_gmt":"2024-11-05T14:33:31","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/can-csa-iso-iec-27036-318\/"},"modified":"2024-11-05T14:33:31","modified_gmt":"2024-11-05T14:33:31","slug":"can-csa-iso-iec-27036-318","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/csa\/can-csa-iso-iec-27036-318\/","title":{"rendered":"CAN\/CSA-ISO\/IEC 27036-3:18"},"content":{"rendered":"
CSA Preface<\/strong><\/p>\n <\/p>\n Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO\/IEC Joint Technical Committee 1 on Information Technology (ISO\/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).<\/p>\n <\/p>\n Scope<\/strong><\/p>\n <\/p>\n This part of ISO\/IEC 27036 provides product and service acquirers and suppliers in ICT supply chain with guidance on:<\/p>\n <\/p>\n a) gaining visibility into and managing the information security risks caused by physically dispersed and multi-layered ICT supply chains;<\/p>\n <\/p>\n b) responding to risks stemming from the global ICT supply chain to ICT products and services that can have an information security impact on the organizations using these products and services. These risks can be related to organizational as well as technical aspects (e.g. insertion of malicious code or presence of the counterfeit information technology (IT) products);<\/p>\n <\/p>\n c) integrating information security processes and practices into the system and software lifecycle processes, described in ISO\/IEC 15288 and ISO\/IEC 12207, while supporting information security controls, described in ISO\/IEC 27002.<\/p>\n <\/p>\n This part of ISO\/IEC 27036 does not include business continuity management\/resiliency issues involved with the ICT supply chain. ISO\/IEC 27031 addresses business continuity.<\/p>\n","protected":false},"excerpt":{"rendered":" Information technology \u2014 Security techniques \u2014 Information security for supplier relationships \u2014 Part 3: Guidelines for information and communication technology supply chain security<\/b><\/p>\n\n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n CSA<\/b><\/a><\/td>\n 2018<\/td>\n 54<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":515128,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[657,2674],"product_tag":[],"class_list":{"0":"post-515115","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-040","7":"product_cat-csa","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/515115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/515128"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=515115"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=515115"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=515115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}