Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- •ISO/IEC 27000 — Information security management systems — Overview and vocabulary
- •ISO/IEC 27001 — Information technology - Security Techniques - Information security management systems — Requirements. The older ISO/IEC 27001:2005 standard relied on the Plan-Do-Check-Act cycle; the newer ISO/IEC 27001:2013 does not, but has been updated in other ways to reflect changes in technologies and in how organizations manage information.
- •ISO/IEC 27002 — Code of practice for information security management
- •ISO/IEC 27003 — Information security management system implementation guidance
- •ISO/IEC 27004 — Information security management — Measurement
- •ISO/IEC 27005 — Information security risk management
- •ISO/IEC 27006 — Requirements for bodies providing audit and certification of information security management systems
- •ISO/IEC 27007 — Guidelines for information security management systems auditing (focused on the management system)
- •ISO/IEC TR 27008 — Guidance for auditors on ISMS controls (focused on the information security controls)
- •ISO/IEC 27010 — Information security management for inter-sector and inter-organizational communications
- •ISO/IEC 27011 — Information security management guidelines for telecommunications organizations based on ISO/IEC 27002
- •ISO/IEC 27013 — Guideline on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
- •ISO/IEC 27014 — Information security governance. Mahncke assessed this standard in the context of Australian e-health.
- •ISO/IEC TR 27015 — Information security management guidelines for financial services
- •ISO/IEC 27017 — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
- •ISO/IEC 27018 — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- •ISO/IEC 27031 — Guidelines for information and communication technology readiness for business continuity
- •ISO/IEC 27032 — Guideline for cybersecurity
- •ISO/IEC 27033-1 — Network security - Part 1: Overview and concepts
- •ISO/IEC 27033-2 — Network security - Part 2: Guidelines for the design and implementation of network security
- •ISO/IEC 27033-3 — Network security - Part 3: Reference networking scenarios - Threats, design techniques and control issues
- •ISO/IEC 27033-5 — Network security - Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
- •ISO/IEC 27034-1 — Application security - Part 1: Guideline for application security
- •ISO/IEC 27035 — Information security incident management
- •ISO/IEC 27036-3 — Information security for supplier relationships - Part 3: Guidelines for information and communication technology supply chain security
- •ISO/IEC 27037 — Guidelines for identification, collection, acquisition and preservation of digital evidence
- •ISO 27799 — Information security management in health using ISO/IEC 27002. The purpose of ISO 27799 is to provide guidance to health organizations and other holders of personal health information on how to protect such information via implementation of ISO/IEC 27002.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement