{"id":402169,"date":"2024-10-20T04:59:54","date_gmt":"2024-10-20T04:59:54","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-22-30422725-dc-2022\/"},"modified":"2024-10-26T08:52:20","modified_gmt":"2024-10-26T08:52:20","slug":"bsi-22-30422725-dc-2022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-22-30422725-dc-2022\/","title":{"rendered":"BSI 22\/30422725 DC 2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions
3.1 General <\/td>\n<\/tr>\n
10<\/td>\n3.2 Terms relating to storage technology <\/td>\n<\/tr>\n
12<\/td>\n3.3 Terms relating to sanitization <\/td>\n<\/tr>\n
13<\/td>\n3.4 Terms relating to availability
3.5 Terms relating to security and cryptography <\/td>\n<\/tr>\n
14<\/td>\n3.6 Terms relating to archives and repositories <\/td>\n<\/tr>\n
16<\/td>\n3.7 Miscellaneous terms
4 Symbols and abbreviated terms <\/td>\n<\/tr>\n
20<\/td>\n5 Structure of this document
5.1 Clauses
5.2 Controls <\/td>\n<\/tr>\n
21<\/td>\n6 Overview and concepts
6.1 General
6.2 Storage concepts <\/td>\n<\/tr>\n
22<\/td>\n6.3 Introduction to storage security <\/td>\n<\/tr>\n
25<\/td>\n6.4 Storage security risks
6.4.1 Background
6.4.2 Data breaches <\/td>\n<\/tr>\n
26<\/td>\n6.4.3 Data corruption or destruction <\/td>\n<\/tr>\n
27<\/td>\n6.4.4 Temporary or permanent loss of access\/availability
6.4.5 Failure to meet statutory, regulatory, or legal requirements
7 Organizational controls for storage
7.1 General <\/td>\n<\/tr>\n
28<\/td>\n7.2 Align storage and policy <\/td>\n<\/tr>\n
29<\/td>\n7.3 Business continuity management <\/td>\n<\/tr>\n
30<\/td>\n7.4 Compliance <\/td>\n<\/tr>\n
31<\/td>\n8 People controls for storage <\/td>\n<\/tr>\n
32<\/td>\n9 Physical controls for storage
9.1 General
9.2 Physically secure storage <\/td>\n<\/tr>\n
33<\/td>\n9.3 Protect physical interfaces to storage
9.4 Isolation of storage systems <\/td>\n<\/tr>\n
34<\/td>\n10 Technological controls for storage
10.1 General <\/td>\n<\/tr>\n
35<\/td>\n10.2 Design and implementation of storage security
10.2.1 General
10.2.2 Storage security design principles <\/td>\n<\/tr>\n
37<\/td>\n10.2.3 Storage system quality attributes <\/td>\n<\/tr>\n
40<\/td>\n10.2.4 Retention, preservation, and disposal of data
10.3 Storage systems security
10.3.1 System hardening <\/td>\n<\/tr>\n
41<\/td>\n10.3.2 Security auditing, accounting, and monitoring <\/td>\n<\/tr>\n
44<\/td>\n10.3.3 Storage vulnerability management
10.4 Storage management
10.4.1 Background <\/td>\n<\/tr>\n
45<\/td>\n10.4.2 Authentication and authorization <\/td>\n<\/tr>\n
46<\/td>\n10.4.3 Secure the management interfaces <\/td>\n<\/tr>\n
48<\/td>\n10.5 Data confidentiality
10.5.1 General <\/td>\n<\/tr>\n
49<\/td>\n10.5.2 Encryption and key management issues
10.5.3 Encryption of storage <\/td>\n<\/tr>\n
52<\/td>\n10.5.4 Encrypting transferred data <\/td>\n<\/tr>\n
53<\/td>\n10.5.5 Encrypting data at rest <\/td>\n<\/tr>\n
54<\/td>\n10.6 Storage sanitization
10.6.1 General <\/td>\n<\/tr>\n
55<\/td>\n10.6.2 Selection of sanitization methods <\/td>\n<\/tr>\n
56<\/td>\n10.6.3 Media-based sanitization
10.6.4 Logical sanitization <\/td>\n<\/tr>\n
57<\/td>\n10.6.5 Cryptographic erase <\/td>\n<\/tr>\n
58<\/td>\n10.6.6 Verification of storage sanitization <\/td>\n<\/tr>\n
59<\/td>\n10.6.7 Proof of sanitization <\/td>\n<\/tr>\n
60<\/td>\n10.7 Direct Attached Storage (DAS)
10.8 Storage networking
10.8.1 Background <\/td>\n<\/tr>\n
61<\/td>\n10.8.2 Storage Area Networks (SAN) <\/td>\n<\/tr>\n
66<\/td>\n10.8.3 Network Attached Storage (NAS) protocols <\/td>\n<\/tr>\n
68<\/td>\n10.9 Block-based storage
10.9.1 Fibre Channel (FC) storage <\/td>\n<\/tr>\n
69<\/td>\n10.9.2 IP storage
10.10 File-based storage
10.10.1 General <\/td>\n<\/tr>\n
70<\/td>\n10.10.2 NFS-based NAS
10.10.3 SMB-based NAS <\/td>\n<\/tr>\n
71<\/td>\n10.11 Cloud computing storage
10.11.1 Securing cloud computing storage <\/td>\n<\/tr>\n
72<\/td>\n10.11.2 CDMI security <\/td>\n<\/tr>\n
73<\/td>\n10.12 Object-based storage
10.13 Data reductions <\/td>\n<\/tr>\n
74<\/td>\n10.14 Data protection and recovery
10.14.1 General <\/td>\n<\/tr>\n
75<\/td>\n10.14.2 Storage backups
10.14.3 Storage replication <\/td>\n<\/tr>\n
76<\/td>\n10.14.4 Continuous data protection (CDP)
10.15 Data archives and repositories
10.15.1 General
10.15.2 Data Archives <\/td>\n<\/tr>\n
80<\/td>\n10.15.3 Data Repositories <\/td>\n<\/tr>\n
81<\/td>\n10.16 Virtualization
10.16.1 Storage virtualization <\/td>\n<\/tr>\n
82<\/td>\n10.16.2 Storage for virtualized systems <\/td>\n<\/tr>\n
83<\/td>\n10.17 Secure multi-tenancy <\/td>\n<\/tr>\n
84<\/td>\n10.18 Secure autonomous data movement <\/td>\n<\/tr>\n
86<\/td>\nAnnex\u20acA (informative) Storage security controls summary <\/td>\n<\/tr>\n
94<\/td>\nBibliography <\/td>\n<\/tr>\n
98<\/td>\nIndex <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS EN ISO\/IEC 27040. Information technology. Security techniques. Storage security<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n101<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":402178,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-402169","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/402169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/402178"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=402169"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=402169"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=402169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}