{"id":438865,"date":"2024-10-20T08:05:53","date_gmt":"2024-10-20T08:05:53","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-270712023\/"},"modified":"2024-10-26T15:10:26","modified_gmt":"2024-10-26T15:10:26","slug":"bs-iso-iec-270712023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-270712023\/","title":{"rendered":"BS ISO\/IEC 27071:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 3.1 Terms relating to cloud computing <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3.2 Terms relating to cloud computing roles and activities 3.3 Terms relating to security and privacy <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 3.4 Miscellaneous terms <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4 Abbreviated terms 5 Framework and components for establishing a trusted connection 5.1 Overview <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.2 Hardware security module 5.3 Root of trust <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.4 Identity 5.5 Authentication and key establishment 5.6 Remote attestation 5.7 Data integrity and authenticity 5.8 Trusted user interface 6 Security recommendations for establishing a trusted connection 6.1 Hardware security module <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.2 Root of trust 6.3 Identity 6.4 Authentication and key establishment 6.5 Remote attestation <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.6 Data integrity and authenticity 6.7 Trusted user interface <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Annex A (informative) Threats <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Annex B (informative) Solutions for components of a trusted connection <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex C (informative) Example of establishing a trusted connection <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Cybersecurity. Security recommendations for establishing trusted connections between devices and services<\/b><\/p>\n |