• 13/30266767 DC : 0

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS

    Available format(s):  Hardcopy, PDF

    Superseded date:  31-08-2014

    Language(s):  English

    Published date: 

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    0 Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Overview
    5 Information security policies
    6 Organization of information security
    7 Human resource security
    8 Asset management
    9 Access control
    10 Cryptography
    11 Physical and environmental security
    12 Operations security
    13 Communications security
    14 System acquisition, development and maintenance
    15 Supplier relationships
    16 Information security incident management
    17 Information security aspects of business continuity
       management
    18 Compliance
    Annex A (normative) - Public cloud PII processor extended
            control set for PII protection
    Bibliography

    General Product Information - (Show below) - (Hide below)

    Comment Closes On
    Committee IST/33/-/5
    Document Type Draft
    Publisher British Standards Institution
    Status Superseded
    Superseded By

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 27036-4:2016 Information technology Security techniques Information security for supplier relationships Part 4: Guidelines for security of cloud services
    ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
    ISO/IEC 27035:2011 Information technology Security techniques Information security incident management
    ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
    ISO/IEC 29191:2012 Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication.
    ISO/IEC 29134:2017 Information technology — Security techniques — Guidelines for privacy impact assessment
    ISO/IEC 27005:2011 Information technology Security techniques Information security risk management
    ISO/IEC 29101:2013 Information technology Security techniques Privacy architecture framework
    ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
    ISO/IEC 17789:2014 Information technology — Cloud computing — Reference architecture
    ISO/IEC 17788:2014 Information technology — Cloud computing — Overview and vocabulary
    ISO/IEC 29100:2011 Information technology — Security techniques — Privacy framework
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective