• There are no items in your cart

14/30249803 DC : 0

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY

Available format(s)

Hardcopy , PDF

Superseded date

01-31-2015

Language(s)

English

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Overview and concepts
6 Supporting controls
7 Guidelines for the design and implementation
  of storage security
Annex A (normative) - Media sanitization
Annex B (informative) - Selecting appropriate
        storage security controls
Annex C (informative) - Important security
        concepts
Bibliography
Index

BS ISO/IEC 27040

Committee
IST/33
DocumentType
Draft
Pages
123
PublisherName
British Standards Institution
Status
Superseded
SupersededBy

FIPS PUB 140 : 0001 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ANSI INCITS 400 : 2004 INFORMATION TECHNOLOGY - SCSI OBJECT-BASED STORAGE DEVICE COMMANDS (OSD)
ISO/IEC 27003:2017 Information technology — Security techniques — Information security management systems — Guidance
ISO/TR 10255:2009 Document management applications Optical disk storage technology, management and standards
ISO/IEC 27037:2012 Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence
ISO/IEC 27031:2011 Information technology Security techniques Guidelines for information and communication technology readiness for business continuity
ISO/IEC/IEEE 24765:2017 Systems and software engineering — Vocabulary
ISO/IEC 27033-1:2015 Information technology Security techniques Network security Part 1: Overview and concepts
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO 16609:2012 Financial services — Requirements for message authentication using symmetric techniques
ISO 16175-2:2011 Information and documentation Principles and functional requirements for records in electronic office environments Part 2: Guidelines and functional requirements for digital records management systems
ISO/TR 18492:2005 Long-term preservation of electronic document-based information
ANSI INCITS 482 : 2012 INFORMATION TECHNOLOGY - ATA/ATAPI COMMAND SET - 2 (ACS-2)
ANSI INCITS 424 : 2007 FIBRE CHANNEL - FRAMING AND SIGNALING - 2 (FC-FS-2)
IEEE 1619-2007 IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices
ISO/IEC 17826:2016 Information technology Cloud Data Management Interface (CDMI)
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
FIPS PUB 197 : 2001 ADVANCED ENCRYPTION STANDARD (AES)
ISO 16175-3:2010 Information and documentation Principles and functional requirements for records in electronic office environments Part 3: Guidelines and functional requirements for records in business systems
IEEE 1619.1-2007 IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices
ANSI INCITS 458 : 2011 INFORMATION TECHNOLOGY - SCSI OBJECT-BASED STORAGE DEVICE COMMANDS - 2 (OSD-2)
ANSI INCITS 496 : 2012 INFORMATION TECHNOLOGY - FIBRE CHANNEL - SECURITY PROTOCOLS - 2 (FC-SP-2)
ISO/IEC 27005:2011 Information technology Security techniques Information security risk management
ISO/IEC 24759:2017 Information technology Security techniques Test requirements for cryptographic modules
ISO/IEC 27033-3:2010 Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues
ISO/IEC 27033-2:2012 Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/PAS 22399:2007 Societal security - Guideline for incident preparedness and operational continuity management
ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
ISO 16175-1:2010 Information and documentation Principles and functional requirements for records in electronic office environments Part 1: Overview and statement of principles
ISO Guide 73:2009 Risk management — Vocabulary

View more information
US$52.71
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.