Advertisement
opexxx

ISO/IEC.txt

Aug 7th, 2017
322
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.14 KB | None | 0 0
  1.  
  2. •ISO/IEC 27000 — Information security management systems — Overview and vocabulary
  3. •ISO/IEC 27001 — Information technology - Security Techniques - Information security management systems — Requirements. The older ISO/IEC 27001:2005 standard relied on the Plan-Do-Check-Act cycle; the newer ISO/IEC 27001:2013 does not, but has been updated in other ways to reflect changes in technologies and in how organizations manage information.
  4. •ISO/IEC 27002 — Code of practice for information security management
  5. •ISO/IEC 27003 — Information security management system implementation guidance
  6. •ISO/IEC 27004 — Information security management — Measurement
  7. •ISO/IEC 27005 — Information security risk management
  8. •ISO/IEC 27006 — Requirements for bodies providing audit and certification of information security management systems
  9. •ISO/IEC 27007 — Guidelines for information security management systems auditing (focused on the management system)
  10. •ISO/IEC TR 27008 — Guidance for auditors on ISMS controls (focused on the information security controls)
  11. •ISO/IEC 27010 — Information security management for inter-sector and inter-organizational communications
  12. •ISO/IEC 27011 — Information security management guidelines for telecommunications organizations based on ISO/IEC 27002
  13. •ISO/IEC 27013 — Guideline on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
  14. •ISO/IEC 27014 — Information security governance. Mahncke assessed this standard in the context of Australian e-health.
  15. •ISO/IEC TR 27015 — Information security management guidelines for financial services
  16. •ISO/IEC 27017 — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
  17. •ISO/IEC 27018 — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
  18. •ISO/IEC 27031 — Guidelines for information and communication technology readiness for business continuity
  19. •ISO/IEC 27032 — Guideline for cybersecurity
  20. •ISO/IEC 27033-1 — Network security - Part 1: Overview and concepts
  21. •ISO/IEC 27033-2 — Network security - Part 2: Guidelines for the design and implementation of network security
  22. •ISO/IEC 27033-3 — Network security - Part 3: Reference networking scenarios - Threats, design techniques and control issues
  23. •ISO/IEC 27033-5 — Network security - Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
  24. •ISO/IEC 27034-1 — Application security - Part 1: Guideline for application security
  25. •ISO/IEC 27035 — Information security incident management
  26. •ISO/IEC 27036-3 — Information security for supplier relationships - Part 3: Guidelines for information and communication technology supply chain security
  27. •ISO/IEC 27037 — Guidelines for identification, collection, acquisition and preservation of digital evidence
  28. •ISO 27799 — Information security management in health using ISO/IEC 27002. The purpose of ISO 27799 is to provide guidance to health organizations and other holders of personal health information on how to protect such information via implementation of ISO/IEC 27002.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement