User Tools

Site Tools


atrc_website:security_compliance_services

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Last revisionBoth sides next revision
atrc_website:security_compliance_services [2023/09/21 11:06] wikiadminatrc_website:security_compliance_services [2023/09/21 11:07] wikiadmin
Line 28: Line 28:
 Compliance to : {{ :atrc_website:bsi-standard-2002_en_pdf.pdf |BSI Standard 200-2}} forms the basis of BSI's methodology for establishing a sound information security management system (ISMS). It establishes three procedures for implementing IT baseline protection. Compliance to : {{ :atrc_website:bsi-standard-2002_en_pdf.pdf |BSI Standard 200-2}} forms the basis of BSI's methodology for establishing a sound information security management system (ISMS). It establishes three procedures for implementing IT baseline protection.
  
-Compliance to : BSI Standard 200-3 bundles all risk-related steps in the implementation of IT baseline protection.+Compliance to : {{ :atrc_website:bsi-standard-2003_en_pdf.pdf |BSI Standard 200-3}} bundles all risk-related steps in the implementation of IT baseline protection.
  
 IEC 62443 : This cybersecurity standard defines processes, techniques and requirements for Industrial Automation and Control Systems (IACS) IEC 62443 : This cybersecurity standard defines processes, techniques and requirements for Industrial Automation and Control Systems (IACS)
atrc_website/security_compliance_services.txt · Last modified: 2023/09/21 11:09 by wikiadmin