• BS ISO/IEC 27002 : 2013

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS

    Available format(s):  Hardcopy, PDF

    Superseded date:  31-03-2017

    Language(s):  English

    Published date:  01-01-2013

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    0 Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Structure of this standard
    5 Information security policies
    6 Organization of information security
    7 Human resource security
    8 Asset management
    9 Access control
    10 Cryptography
    11 Physical and environmental security
    12 Operations security
    13 Communications security
    14 System acquisition, development and maintenance
    15 Supplier relationships
    16 Information security incident management
    17 Information security aspects of business continuity
       management
    18 Compliance
    Bibliography

    Abstract - (Show below) - (Hide below)

    Provides guidelines for organizational information security standards and information security management practice including the selection, implementation and management of controls taking into consideration the organization's information security risk environments(s).

    General Product Information - (Show below) - (Hide below)

    Committee IST/33
    Development Note Supersedes BS ISO/IEC 17799. AMD 17310 issued on 31-07-2007 Redesignates BS ISO/IEC 17799 as BS ISO/IEC 27002. (08/2007) Supersedes BS 7799-1(2005) & 12/30186137 DC. (10/2013) Renumbered and superseded by BS EN ISO/IEC 27002. (03/2017)
    Document Type Standard
    Publisher British Standards Institution
    Status Superseded
    Superseded By
    Supersedes

    Standards Referenced By This Book - (Show below) - (Hide below)

    BS 7984-2:2014 Keyholding and response services Lone worker response services
    BS 8406:2009 Event stewarding and crowd safety. Code of practice
    13/30274342 DC : 0 BS 11200 - CRISIS MANAGEMENT - GUIDANCE AND GOOD PRACTICE
    BS 11200:2014 Crisis management. Guidance and good practice
    16/30342526 DC : 0 BS 31111 - CYBER RISK AND RESILIENCE - GUIDE
    BS 8591:2014 Remote centres receiving signals from alarm systems. Code of practice
    13/30286749 DC : 0 BS 8591 - REMOTE CENTRES RECEIVING SIGNALS FROM ALARM SYSTEMS - CODE OF PRACTICE
    15/30324695 DC : 0 BS 7984-1 - KEYHOLDING AND RESPONSE SERVICES - PART 1: GENERAL RECOMMENDATIONS FOR KEYHOLDING AND RESPONSE SERVICES
    14/30288995 DC : 0 BS 7984-2 - KEYHOLDING AND RESPONSE SERVICES - PART 2: LONE WORKER RESPONSE SERVICE
    BS 25777:2008 INFORMATION AND COMMUNICATIONS TECHNOLOGY CONTINUITY MANAGEMENT - CODE OF PRACTICE
    BS 7984-1:2016 Keyholding and response services General recommendations for keyholding and response services
    BIP 0117 : 2015 CLOUD COMPUTING - A PRACTICAL INTRODUCTION TO THE LEGAL ISSUES
    BS 7858:2012 Security screening of individuals employed in a security environment. Code of practice

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
    ISO/IEC 27035:2011 Information technology Security techniques Information security incident management
    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    ISO 31000:2009 Risk management Principles and guidelines
    ISO/IEC 27037:2012 Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence
    ISO 22301:2012 Societal security Business continuity management systems Requirements
    ISO/IEC 27031:2011 Information technology Security techniques Guidelines for information and communication technology readiness for business continuity
    ISO/IEC 27033-1:2015 Information technology Security techniques Network security Part 1: Overview and concepts
    ISO/IEC 27033-5:2013 Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
    ISO/IEC 20000-1:2011 Information technology Service management Part 1: Service management system requirements
    ISO/IEC 27036-3:2013 Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security
    ISO/IEC 20000-2:2012 Information technology Service management Part 2: Guidance on the application of service management systems
    ISO/IEC 27005:2011 Information technology Security techniques Information security risk management
    ISO/IEC 29101:2013 Information technology Security techniques Privacy architecture framework
    ISO/IEC 27033-4:2014 Information technology Security techniques Network security Part 4: Securing communications between networks using security gateways
    ISO/IEC 27036-1:2014 Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts
    ISO/IEC 27036-2:2014 Information technology Security techniques Information security for supplier relationships Part 2: Requirements
    ISO/IEC TR 27008:2011 Information technology Security techniques Guidelines for auditors on information security controls
    ISO/IEC 27007:2017 Information technology Security techniques Guidelines for information security management systems auditing
    ISO/IEC 27033-3:2010 Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues
    ISO/IEC 27033-2:2012 Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
    ISO 22313:2012 Societal security Business continuity management systems Guidance
    ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    ISO 15489-1:2016 Information and documentation Records management Part 1: Concepts and principles
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    ISO/IEC 29100:2011 Information technology — Security techniques — Privacy framework
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective