• There are no items in your cart

BS ISO/IEC 27036-3:2013

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Information technology. Security techniques. Information security for supplier relationships Guidelines for information and communication technology supply chain security

Available format(s)

Hardcopy , PDF

Superseded date

23-06-2023

Superseded by

BS ISO/IEC 27036-3:2023

Language(s)

English

Published date

30-11-2013

€231.38
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Structure of this standard
5 Key concepts
6 ICT supply chain security in Lifecycle Processes
Annex A (informative) - Summary of Supply and
        Acquisition Processes from ISO/IEC 15288
        and ISO/IEC 12207
Annex B (informative) - Clause 6 mapping to
        ISO/IEC 27002
Bibliography

Gives product and service acquirers and suppliers in ICT supply chain with guidance on: a) gaining visibility into and managing the information security risks caused by physically dispersed and multi-layered ICT supply chains; b) responding to risks stemming from the global ICT supply chain to ICT products and services that can have an information security impact on the organizations using these products and services. These risks can be related to organizational as well as technical aspects (e.g. insertion of malicious code or presence of the counterfeit information technology (IT) products); and c) integrating information security processes and practices into the system and software lifecycle processes, described in ISO/IEC 15288 and ISO/IEC 12207, while supporting information security controls, described in ISO/IEC 27002.

Committee
IST/33/4
DevelopmentNote
Supersedes 12/30250178 DC. (11/2013)
DocumentType
Standard
Pages
48
PublisherName
British Standards Institution
Status
Superseded
SupersededBy
Supersedes

This part of ISO/IEC27036 provides product and service acquirers and suppliers in ICT supply chain with guidance on: gaining visibility into and managing the information security risks caused by physically dispersed and multi-layered ICT supply chains; responding to risks stemming from the global ICT supply chain to ICT products and services that can have an information security impact on the organizations using these products and services. These risks can be related to organizational as well as technical aspects (e.g. insertion of malicious code or presence of the counterfeit information technology (IT) products); integrating information security processes and practices into the system and software lifecycle processes, described in ISO/IEC15288 and ISO/IEC12207, while supporting information security controls, described in ISO/IEC27002. This part of ISO/IEC27036 does not include business continuity management/resiliency issues involved with the ICT supply chain. ISO/IEC27031 addresses business continuity.

Standards Relationship
ISO/IEC 27036-3:2013 Identical

ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC 15026:1998 Information technology System and software integrity levels
ISO/IEC 27004:2016 Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
ISO 28001:2007 Security management systems for the supply chain Best practices for implementing supply chain security, assessments and plans Requirements and guidance
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO/IEC 20000-1:2011 Information technology Service management Part 1: Service management system requirements
ISO/IEC 15288:2008 Systems and software engineering — System life cycle processes
ISO/IEC 27005:2011 Information technology Security techniques Information security risk management
ISO/IEC 12207:2008 Systems and software engineering — Software life cycle processes
ISO/IEC 27036-1:2014 Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts
ISO/IEC 27036-2:2014 Information technology Security techniques Information security for supplier relationships Part 2: Requirements
ISO/IEC 27007:2017 Information technology Security techniques Guidelines for information security management systems auditing
ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.