Informējam, ka Sistēma pielāgota darbam ar interneta pārlūkprogrammu Internet Explorer (8. un jaunākām versijām) un Mozilla Firefox (3.6 un jaunākām versijām).
Izmantojot citu interneta pārlūkprogrammu, brīdinām, ka Sistēmas funkcionalitāte var tikt traucēta.
<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';">This document provides guidance for product and service acquirers, as well as suppliers of hardware, software and services, regarding:</span></p>
<p class="ListNumber1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';">a)<span style="mso-tab-count: 1;"> </span>gaining visibility into and managing the information security risks caused by physically dispersed and multi-layered hardware, software, and services supply chains;</span></p>
<p class="ListNumber1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';">b)<span style="mso-tab-count: 1;"> </span>responding to risks stemming from this physically dispersed and multi-layered hardware, software, and services supply chain that can have an information security impact on the organizations using these products and services;</span></p>
<p class="ListNumber1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';">c)<span style="mso-tab-count: 1;"> </span>integrating information security processes and practices into the system and software life cycle processes, as described in </span><span class="stdpublisher"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; color: black; mso-color-alt: windowtext;">ISO/IEC/IEEE</span></span><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';"> <span class="stddocNumber"><span style="color: black; mso-color-alt: windowtext;">15288</span></span> and <span class="stdpublisher"><span style="color: black; mso-color-alt: windowtext;">ISO/IEC/IEEE</span></span> <span class="stddocNumber"><span style="color: black; mso-color-alt: windowtext;">12207</span></span>, while supporting information security controls, as described in <span class="stdpublisher"><span style="color: black; mso-color-alt: windowtext;">ISO/IEC</span></span> <span class="stddocNumber"><span style="color: black; mso-color-alt: windowtext;">27002</span></span>.</span></p>
<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';">This document does not include business continuity management/resiliency issues involved with the hardware, software, and services supply chain. </span><span class="stdpublisher"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; color: black; mso-color-alt: windowtext;">ISO/IEC</span></span><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';"> <span class="stddocNumber"><span style="color: black; mso-color-alt: windowtext;">27031</span></span> addresses information and communication technology readiness for business continuity.</span></p>
Reģistrācijas numurs (WIID)
82890
Darbības sfēra
<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';">This document provides guidance for product and service acquirers, as well as suppliers of hardware, software and services, regarding:</span></p>
<p class="ListNumber1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';">a)<span style="mso-tab-count: 1;"> </span>gaining visibility into and managing the information security risks caused by physically dispersed and multi-layered hardware, software, and services supply chains;</span></p>
<p class="ListNumber1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';">b)<span style="mso-tab-count: 1;"> </span>responding to risks stemming from this physically dispersed and multi-layered hardware, software, and services supply chain that can have an information security impact on the organizations using these products and services;</span></p>
<p class="ListNumber1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';">c)<span style="mso-tab-count: 1;"> </span>integrating information security processes and practices into the system and software life cycle processes, as described in </span><span class="stdpublisher"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; color: black; mso-color-alt: windowtext;">ISO/IEC/IEEE</span></span><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';"> <span class="stddocNumber"><span style="color: black; mso-color-alt: windowtext;">15288</span></span> and <span class="stdpublisher"><span style="color: black; mso-color-alt: windowtext;">ISO/IEC/IEEE</span></span> <span class="stddocNumber"><span style="color: black; mso-color-alt: windowtext;">12207</span></span>, while supporting information security controls, as described in <span class="stdpublisher"><span style="color: black; mso-color-alt: windowtext;">ISO/IEC</span></span> <span class="stddocNumber"><span style="color: black; mso-color-alt: windowtext;">27002</span></span>.</span></p>
<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';">This document does not include business continuity management/resiliency issues involved with the hardware, software, and services supply chain. </span><span class="stdpublisher"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; color: black; mso-color-alt: windowtext;">ISO/IEC</span></span><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho';"> <span class="stddocNumber"><span style="color: black; mso-color-alt: windowtext;">27031</span></span> addresses information and communication technology readiness for business continuity.</span></p>