• Shopping Cart
    There are no items in your cart

BS ISO/IEC 27032:2012

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Information technology. Security techniques. Guidelines for cybersecurity

Available format(s)

Hardcopy , PDF

Superseded date

28-06-2023

Superseded by

BS ISO/IEC 27032:2023

Language(s)

English

Published date

31-07-2012

€303.84
Excluding VAT

Foreword
Introduction
1 Scope
2 Applicability
3 Normative references
4 Terms and definitions
5 Abbreviated terms
6 Overview
7 Stakeholders in the Cyberspace
8 Assets in the Cyberspace
9 Threats against the security of the Cyberspace
10 Roles of stakeholders in Cybersecurity
11 Guidelines for stakeholders
12 Cybersecurity controls
13 Framework of information sharing and coordination
Annex A (informative) - Cybersecurity readiness
Annex B (informative) - Additional resources
Annex C (informative) - Examples of related documents
Bibliography

Specifies guidance for improving the state of Cybersecurity, drawing out the unique aspects of that activity and its dependencies on other security domains, in particular: - information security, - network security, - internet security, and - critical information infrastructure protection (CIIP).

Committee
IST/33/4
DevelopmentNote
Supersedes 11/30168516 DC. (08/2012)
DocumentType
Standard
Pages
62
PublisherName
British Standards Institution
Status
Superseded
SupersededBy
Supersedes

This International Standard provides guidance for improving the state of Cybersecurity, drawing out the unique aspects of that activity and its dependencies on other security domains, in particular:

  • information security,

  • network security,

  • internet security, and

  • critical information infrastructure protection (CIIP).

It covers the baseline security practices for stakeholders in the Cyberspace. This International Standard provides:

  • an overview of Cybersecurity,

  • an explanation of the relationship between Cybersecurity and other types of security,

  • a definition of stakeholders and a description of their roles in Cybersecurity,

  • guidance for addressing common Cybersecurity issues, and

  • a framework to enable stakeholders to collaborate on resolving Cybersecurity issues.

Standards Relationship
ISO/IEC 27032:2012 Identical

BS 11200:2014 Crisis management. Guidance and good practice
13/30274342 DC : 0 BS 11200 - CRISIS MANAGEMENT - GUIDANCE AND GOOD PRACTICE
16/30342526 DC : 0 BS 31111 - CYBER RISK AND RESILIENCE - GUIDE

ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC 29147:2014 Information technology Security techniques Vulnerability disclosure
ISO/IEC 27035:2011 Information technology Security techniques Information security incident management
ISO 31000:2009 Risk management Principles and guidelines
ISO/IEC 27031:2011 Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO/IEC 27010:2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications
ISO/IEC 19770-1:2012 Information technology Software asset management Part 1: Processes and tiered assessment of conformance
ISO/IEC 20000-1:2011 Information technology Service management Part 1: Service management system requirements
ISO/IEC TR 19791:2010 Information technology Security techniques Security assessment of operational systems
ISO/IEC 27005:2011 Information technology Security techniques Information security risk management
ISO/IEC 12207:2008 Systems and software engineering — Software life cycle processes
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
ISO Guide 73:2009 Risk management — Vocabulary

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.