12/30250178 DC : 0
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
BS ISO/IEC 27036-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 3: GUIDELINES FOR ICT SUPPLY CHAIN SECURITY
Hardcopy , PDF
30-11-2013
English
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Structure of this Standard
5 Key concepts
6 ICT supply chain security in Lifecycle Processes
Annex A (informative) - Summary of Supply and Acquisition
Processes from ISO/IEC 15288 and ISO/IEC 12207
Annex B (informative) - Clause 6 Mapping to ISO/IEC 27002
Bibliography
BS ISO/IEC 27036-3
Committee |
IST/33/-/4
|
DocumentType |
Draft
|
Pages |
51
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC 15026:1998 | Information technology System and software integrity levels |
ISO/IEC 27004:2016 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
ISO 28001:2007 | Security management systems for the supply chain Best practices for implementing supply chain security, assessments and plans Requirements and guidance |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/IEC 20000-1:2011 | Information technology Service management Part 1: Service management system requirements |
ISO/IEC 15288:2008 | Systems and software engineering — System life cycle processes |
ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management |
ISO/IEC 12207:2008 | Systems and software engineering — Software life cycle processes |
ISO/IEC 27036-1:2014 | Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts |
ISO/IEC 27036-2:2014 | Information technology Security techniques Information security for supplier relationships Part 2: Requirements |
ISO/IEC 27007:2017 | Information technology Security techniques Guidelines for information security management systems auditing |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.