• Shopping Cart
    There are no items in your cart

BS ISO/IEC 27039:2015

Current

Current

The latest, up-to-date edition.

Information technology. Security techniques. Selection, deployment and operations of intrusion detection and prevention systems (IDPS)

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

27-06-2018

€322.53
Excluding VAT

Foreword
Introduction
1 Scope
2 Terms and definitions
3 Background
4 General
5 Selection
6 Deployment
7 Operations
Annex A (informative) - Intrusion Detection and
        Prevention System (IDPS): Framework and
        issues to be considered
Bibliography

Gives guidelines to assist organizations in preparing to deploy intrusion detection and prevention systems (IDPS).

Committee
IST/33/4
DevelopmentNote
Supersedes BS ISO/IEC 18043 & 13/30250756 DC. (02/2015)
DocumentType
Standard
Pages
60
PublisherName
British Standards Institution
Status
Current
Supersedes

This International Standard provides guidelines to assist organizations in preparing to deploy intrusion detection and prevention systems (IDPS). In particular, it addresses the selection, deployment, and operations of IDPS. It also provides background information from which these guidelines are derived.

Standards Relationship
ISO/IEC 27039:2015 Identical

ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC 18028-4:2005 Information technology Security techniques IT network security Part 4: Securing remote access
ISO/IEC 27035:2011 Information technology Security techniques Information security incident management
ISO/IEC 27033-1:2015 Information technology Security techniques Network security Part 1: Overview and concepts
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO/IEC 27010:2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications
ISO/IEC 27033-2:2012 Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
ISO/IEC 18028-5:2006 Information technology Security techniques IT network security Part 5: Securing communications across networks using virtual private networks
ISO/IEC 18028-3:2005 Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.