TR 103 305 : 1.1.1
Current
The latest, up-to-date edition.
CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE
Hardcopy , PDF
English
09-06-2015
Intellectual Property Rights
Foreword
Modal verbs terminology
Executive summary
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 Critical Security Controls
Annex A - Attack Types
History
Defines a specific set of technical measures available to detect, prevent, respond, and mitigate damage from the most common to the most advanced of cyber attacks.
Committee |
CYBER
|
DocumentType |
Standard
|
Pages |
68
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
TR 103 303 : 1.1.1 | CYBER; PROTECTION MEASURES FOR ICT IN THE CONTEXT OF CRITICAL INFRASTRUCTURE |
TR 103 456 : 1.1.1 | CYBER; IMPLEMENTATION OF THE NETWORK AND INFORMATION SECURITY (NIS) DIRECTIVE |
TR 103 331 : 1.1.1 | CYBER; STRUCTURED THREAT INFORMATION SHARING |
TR 103 369 : 1.1.1 | CYBER; DESIGN REQUIREMENTS ECOSYSTEM |
TR 103 305-1 : 2.1.1 | CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE; PART 1: THE CRITICAL SECURITY CONTROLS |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.