• 12/30186137 DC : 0

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    BS ISO/IEC 27002 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS

    Available format(s):  Hardcopy, PDF

    Superseded date:  01-10-2013

    Language(s):  English

    Published date: 

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    0 Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Structure of this standard
    5 Security Policies
    6 Organisation of information security
    7 Human resource security
    8 Asset management
    9 Access control
    10 Cryptography
    11 Physical and environmental security
    12 Operations security
    13 Communications security
    14 System acquisition, development and maintenance
    15 Supplier relationships
    16 Information security incident management
    17 Information security aspects of business continuity
       management
    18 Compliance
    19 Bibliography

    General Product Information - (Show below) - (Hide below)

    Comment Closes On
    Committee IST/33
    Document Type Draft
    Publisher British Standards Institution
    Status Superseded
    Superseded By

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO 19011:2011 Guidelines for auditing management systems
    ISO/IEC 18028-4:2005 Information technology Security techniques IT network security Part 4: Securing remote access
    ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
    ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
    ISO/IEC TR 18044:2004 Information technology Security techniques Information security incident management
    ISO/IEC Guide 73:2002 Risk management Vocabulary Guidelines for use in standards
    ISO/IEC 14888-1:2008 Information technology Security techniques Digital signatures with appendix Part 1: General
    ISO/IEC 12207:2008 Systems and software engineering Software life cycle processes
    ISO/IEC TR 13335-3:1998 Information technology Guidelines for the management of IT Security Part 3: Techniques for the management of IT Security
    ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
    ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    ISO/IEC Guide 2:2004 Standardization and related activities General vocabulary
    ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
    ISO/IEC 13335-1:2004 Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    ISO 10007:2017 Quality management — Guidelines for configuration management
    ISO 15489-1:2016 Information and documentation Records management Part 1: Concepts and principles
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective