• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

TR 103 331 : 1.1.1

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

CYBER; STRUCTURED THREAT INFORMATION SHARING

Superseded date

28-09-2019

Published date

03-10-2016

Sorry this product is not available in your region.

Intellectual Property Rights
Foreword
Modal verbs terminology
Executive summary
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 Means for exchanging structured cyber
  threat intelligence
Annex A - Bibliography
History

Gives an overview on the means for describing and exchanging cyber threat information in a standardized and structured manner.

Committee
CYBER
DocumentType
Standard
PublisherName
European Telecommunications Standards Institute
Status
Superseded

TR 103 456 : 1.1.1 CYBER; IMPLEMENTATION OF THE NETWORK AND INFORMATION SECURITY (NIS) DIRECTIVE
GR NFV-SEC 009 : 1.2.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; REPORT ON USE CASES AND TECHNICAL APPROACHES FOR MULTI-LAYER HOST ADMINISTRATION
GS NFV-SEC 009 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; REPORT ON USE CASES AND TECHNICAL APPROACHES FOR MULTI-LAYER HOST ADMINISTRATION

GS ISI 002 : 1.2.1 INFORMATION SECURITY INDICATORS (ISI); EVENT MODEL A SECURITY EVENT CLASSIFICATION MODEL AND TAXONOMY
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC 27004:2016 Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
GS ISI 001-1 : 1.1.2 INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 1: A FULL SET OF OPERATIONAL INDICATORS FOR ORGANIZATIONS TO USE TO BENCHMARK THEIR SECURITY POSTURE
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
GS ISI 005 : 1.1.1 INFORMATION SECURITY INDICATORS (ISI); GUIDELINES FOR SECURITY EVENT DETECTION TESTING AND ASSESSMENT OF DETECTION EFFECTIVENESS
GS ISI 004 : 1.1.1 INFORMATION SECURITY INDICATORS (ISI); GUIDELINES FOR EVENT DETECTION IMPLEMENTATION
GS ISI 001-2 : 1.1.2 INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1
GS ISI 003 : 1.1.2 INFORMATION SECURITY INDICATORS (ISI); KEY PERFORMANCE SECURITY INDICATORS (KPSI) TO EVALUATE THE MATURITY OF SECURITY EVENT DETECTION
TR 103 305 : 1.1.1 CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.