{"id":515132,"date":"2024-11-05T14:33:37","date_gmt":"2024-11-05T14:33:37","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/can-csa-iso-iec-2704118\/"},"modified":"2024-11-05T14:33:37","modified_gmt":"2024-11-05T14:33:37","slug":"can-csa-iso-iec-2704118","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/csa\/can-csa-iso-iec-2704118\/","title":{"rendered":"CAN\/CSA-ISO\/IEC 27041:18"},"content":{"rendered":"
CSA Preface<\/strong><\/p>\n <\/p>\n Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO\/IEC Joint Technical Committee 1 on Information Technology (ISO\/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).<\/p>\n <\/p>\n Scope<\/strong><\/p>\n <\/p>\n This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are fit for purpose. It encapsulates best practice on defining requirements, describing methods, and providing evidence that implementations of methods can be shown to satisfy requirements. It includes consideration of how vendor and third-party testing can be used to assist this assurance process.<\/p>\n <\/p>\n This document aims to<\/p>\n <\/p>\n \u2014 provide guidance on the capture and analysis of functional and non-functional requirements relating to an Information Security (IS) incident investigation<\/p>\n <\/p>\n \u2014 give guidance on the use of validation as a means of assuring suitability of processes involved in the investigation<\/p>\n <\/p>\n \u2014 provide guidance on assessing the levels of validation required and the evidence required from a validation exercise<\/p>\n <\/p>\n \u2014 give guidance on how external testing and documentation can be incorporated in the validation process.<\/p>\n","protected":false},"excerpt":{"rendered":" Information technology \u2014 Security techniques \u2014 Guidance on assuring suitability and adequacy of incident investigative method<\/b><\/p>\n\n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n CSA<\/b><\/a><\/td>\n 2018<\/td>\n 38<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":515144,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[657,2674],"product_tag":[],"class_list":{"0":"post-515132","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-040","7":"product_cat-csa","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/515132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/515144"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=515132"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=515132"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=515132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}