• There are no items in your cart

INCITS/ISO/IEC TR 13335-4:2000

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - GUIDELINES FOR THE MANAGEMENT OF IT SECURITY - PART 4: SELECTION OF SAFEGUARDS

Available format(s)

Hardcopy , PDF

Superseded date

06-03-2016

Language(s)

English

Published date

01-01-2007

FOREWORD
INTRODUCTION
1 SCOPE
2 REFERENCES
3 DEFINITIONS
4 AIM
5 OVERVIEW
6 INTRODUCTION TO SAFEGUARD SELECTION AND THE CONCEPT OF
   BASELINE SECURITY
7 BASIC ASSESSMENTS
   7.1 IDENTIFICATION OF THE TYPE OF IT SYSTEM
   7.2 IDENTIFICATION OF PHYSICAL/ENVIRONMENTAL CONDITIONS
   7.3 ASSESSMENT OF EXISTING/PLANNED SAFEGUARDS
8 SAFEGUARDS
   8.1 ORGANIZATIONAL AND PHYSICAL SAFEGUARDS
   8.2 IT SYSTEM SPECIFIC SAFEGUARDS
9 BASELINE APPROACH: SELECTION OF SAFEGUARDS ACCORDING TO
   THE TYPE OF IT SYSTEM
   9.1 GENERALLY APPLICABLE SAFEGUARDS
   9.2 IT SYSTEM SPECIFIC SAFEGUARDS
10 SELECTION OF SAFEGUARDS ACCORDING TO SECURITY CONCERNS AND
   THREATS
   10.1 ASSESSMENT OF SECURITY CONCERNS
   10.2 SAFEGUARDS FOR CONFIDENTIALITY
   10.3 SAFEGUARDS FOR INTEGRITY
   10.4 SAFEGUARDS FOR AVAILABILITY
   10.5 SAFEGUARDS FOR ACCOUNTABILITY, AUTHENTICITY AND
        RELIABILITY
11 SELECTION OF SAFEGUARDS ACCORDING TO DETAILED
   ASSESSMENTS
   11.1 RELATION BETWEEN PART 3 AND PART 4 OF THIS TECHNICAL
        REPORT
   11.2 PRINCIPLES OF SELECTION
12 DEVELOPMENT OF AN ORGANIZATION-WIDE BASELINE
13 SUMMARY
BIBLIOGRAPHY
ANNEX A CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT
ANNEX B ETSI BASELINE SECURITY STANDARD FEATURES AND MECHANISMS
ANNEX C IT BASELINE PROTECTION MANUAL
ANNEX D NIST COMPUTER SECURITY HANDBOOK
ANNEX E MEDICAL INFORMATICS: SECURITY CATEGORISATION AND
         PROTECTION FOR HEALTHCARE INFORMATION SYSTEMS
ANNEX F TC68 BANKING AND RELATED FINANCIAL SERVICES - INFORMATION
         SECURITY GUIDELINES
ANNEX G PROTECTION OF SENSITIVE INFORMATION NOT COVERED BY THE
         OFFICIAL SECRETS ACT - RECOMMENDATIONS FOR COMPUTER
         WORKSTATIONS
ANNEX H CANADIAN HANDBOOK ON INFORMATION TECHNOLOGY SECURITY

Presents guidance on the selection of safeguards, taking into account business needs and security concerns. It describes a process for the selection of safeguards according to security risks and concerns and the specific environment of an organization.

DocumentType
Standard
Pages
70
ProductNote
Reconfirmed 2000
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC TR 13335-4:2000 Identical

ISO/IEC TR 13335-2:1997 Information technology Guidelines for the management of IT Security Part 2: Managing and planning IT Security
ISO/IEC TR 13335-3:1998 Information technology Guidelines for the management of IT Security Part 3: Techniques for the management of IT Security
ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC TR 13335-1:1996 Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.