INCITS/ISO/IEC 27039 : 2017
Current
Current
The latest, up-to-date edition.
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION AND PREVENTION SYSTEMS (IDPS)
Available format(s)
Hardcopy , PDF
Language(s)
English
Published date
01-01-2017
Publisher
€134.77
Excluding VAT
Foreword
Introduction
1 Scope
2 Terms and definitions
3 Background
4 General
5 Selection
6 Deployment
7 Operations
Annex A (informative) - Intrusion Detection and
Prevention System (IDPS): Framework and
issues to be considered
Bibliography
Gives guidelines to assist organizations in preparing to deploy intrusion detection and prevention systems (IDPS).
| DocumentType |
Standard
|
| Pages |
58
|
| PublisherName |
Information Technology Industry Council
|
| Status |
Current
|
| Standards | Relationship |
| ISO/IEC 27039:2015 | Identical |
| ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
| ISO/IEC 18028-4:2005 | Information technology — Security techniques — IT network security — Part 4: Securing remote access |
| ISO/IEC 27035:2011 | Information technology — Security techniques — Information security incident management |
| ISO/IEC 27033-1:2015 | Information technology — Security techniques — Network security — Part 1: Overview and concepts |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| ISO/IEC 27010:2015 | Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications |
| ISO/IEC 27033-2:2012 | Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security |
| ISO/IEC 18028-5:2006 | Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networks |
| ISO/IEC 18028-3:2005 | Information technology — Security techniques — IT network security — Part 3: Securing communications between networks using security gateways |
Summarise