Search
×
FR

Placeholder headline

This is just a placeholder headline

API Technical Report TDB-6 Chapter 6 – Density

$

204

BUY NOW

Placeholder headline

This is just a placeholder headline

API STD 560: Fired Heaters for General Refinery Services

$

721

BUY NOW

Placeholder headline

This is just a placeholder headline

API STD 64: Diverter Equipment Systems

$

324

BUY NOW

Placeholder headline

This is just a placeholder headline

API MPMS CH 17.10.1: Refrigerated Light Hydrocarbon Fluids – Measurement of Cargoes on Board LNG Carries

$

417

BUY NOW

Placeholder headline

This is just a placeholder headline

API RP 13B-1: Testing Water-based Drilling Fluids

$

418

BUY NOW

Placeholder headline

This is just a placeholder headline

API Technical Report TDB-12 Chapter 12 – Thermal Conductivity

$

214

BUY NOW

Placeholder headline

This is just a placeholder headline

API 16FI Frac Iron Guidelines and Requirements

$

129

BUY NOW

ISO 22340:2024

ISO 22340:2024 Security and resilience – Protective security – Guidelines for an enterprise protective security architecture and framework

CDN $273.00

Description

This document provides guidance on the enterprise protective security architecture and the framework of protective security policies, processes and types of controls necessary to mitigate and manage security risks across the protective security domains, including:

a)    security governance;

b)    personnel security;

c)    information security;

d)    cybersecurity;

e)    physical security.

This document is applicable for any organization.

Edition

1

Published Date

2024-11-01

Status

PUBLISHED

Pages

31

Language Detail Icon

English

Format Secure Icon

Secure PDF

Abstract

This document provides guidance on the enterprise protective security architecture and the framework of protective security policies, processes and types of controls necessary to mitigate and manage security risks across the protective security domains, including:

a)    security governance;

b)    personnel security;

c)    information security;

d)    cybersecurity;

e)    physical security.

This document is applicable for any organization.

Previous Editions

Can’t find what you are looking for?

Please contact us at: