Information technology - Security techniques - Vulnerability handling processes
This document is applicable to vendors involved in handling vulnerabilities.
|Publication type||International Standard|
|TC/SC||ISO/IEC JTC 1/SC 27 - Information security, cybersecurity and privacy protectionrss|
|ICS||35.030 - IT Security|
|File size||1431 KB|
The following test report forms are related:
Share your publications
Learn how to share your publications with your colleagues, using networking options.