ISO/IEC 27013:2015
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Hardcopy , PDF
English
24-11-2015
09-04-2025
ISO/IEC 27013:2015 provides guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000‑1 for those organizations that are intending to either
a) implement ISO/IEC 27001 when ISO/IEC 20000‑1 is already implemented, or vice versa,
b) implement both ISO/IEC 27001 and ISO/IEC 20000‑1 together, or
c) integrate existing management systems based on ISO/IEC 27001 and ISO/IEC 20000‑1.
ISO/IEC 27013:2015 focuses exclusively on the integrated implementation of an information security management system (ISMS) as specified in ISO/IEC 27001 and a service management system (SMS) as specified in ISO/IEC 20000‑1.
In practice, ISO/IEC 27001 and ISO/IEC 20000‑1 can also be integrated with other management system standards, such as ISO 9001 and ISO 14001.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
39
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy | |
| Supersedes |
| Standards | Relationship |
| NEN ISO/IEC 27013 : 2015 | Identical |
| NS ISO/IEC 27013 : 2015 | Identical |
| AS ISO/IEC 27013:2017 | Identical |
| BS ISO/IEC 27013:2015 | Identical |
| DS ISO/IEC 27013 : 2015 | Identical |
| PN ISO/IEC 27013 : 2014 | Identical |
| NBN ISO/IEC 27013 : 2014 | Identical |
| INCITS/ISO/IEC 27013 : 2014 | Identical |
| 15/30319488 DC : 0 | BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
| PD ISO/IEC TR 20000-5:2013 | Information technology. Service management Exemplar implementation plan for ISO/IEC 20000-1 |
| BS ISO/IEC 27000 : 2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
| PD ISO/IEC TR 90006:2013 | Information technology. Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
| PD ISO/IEC TR 20000-11:2015 | Information technology. Service management Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: ITIL® |
| BS EN ISO/IEC 27000:2017 | Information technology. Security techniques. Information security management systems. Overview and vocabulary |
| ISO/IEC 27000:2018 | Information technology — Security techniques — Information security management systems — Overview and vocabulary |
| ISO/IEC TR 20000-11:2015 | Information technology — Service management — Part 11: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: ITIL® |
| 13/30284691 DC : 0 | BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
| BS ISO/IEC 20000-6:2017 | Information technology. Service management Requirements for bodies providing audit and certification of service management systems |
| ISO/IEC 20000-6:2017 | Information technology — Service management — Part 6: Requirements for bodies providing audit and certification of service management systems |
| PD ISO/IEC TR 20000-12:2016 | Information technology. Service management Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC® |
| BIP 0139 : 2013 | AN INTRODUCTION TO ISO/IEC 27001:2013 |
| PD ISO/IEC TR 20000-9:2015 | Information technology. Service management Guidance on the application of ISO/IEC 20000-1 to cloud services |
| BIP 0140 : 2014 | UNDERSTANDING THE NEW ISO MANAGEMENT SYSTEM REQUIREMENTS |
| ISO/IEC TR 20000-9:2015 | Information technology — Service management — Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services |
| I.S. EN ISO/IEC 27000:2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY (ISO/IEC 27000:2016) |
| ISO/IEC TR 20000-10:2015 | Information technology — Service management — Part 10: Concepts and terminology |
| ISO/IEC TR 90006:2013 | Information technology — Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
| ISO/IEC 20000-3:2012 | Information technology — Service management — Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
| ISO/IEC TR 20000-5:2013 | Information technology — Service management — Part 5: Exemplar implementation plan for ISO/IEC 20000-1 |
| EN ISO/IEC 27000:2017 | Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016) |
| PD ISO/IEC TR 20000-10:2015 | Information technology. Service management Concepts and terminology |
| ISO/IEC TR 20000-12:2016 | Information technology — Service management — Part 12: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC |
| BS ISO/IEC 20000-3:2012 | Information technology. Service management Guidance on scope definition and applicability of ISO/IEC 20000-1 |
| CSA ISO/IEC 20000-1:19 | Information technology — Service management — Part 1: Service management system requirements (Adopted ISO/IEC 20000-1:2018, third edition, 2018-09) |
| UNE-ISO/IEC 20000-3:2015 | Information technology. Service management. Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
| UNE-ISO/IEC 27000:2014 | Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary |
| CEI UNI ISO/IEC 20000-1:2020 | Information technology - Service management Part 1: Service management system requirements |
| INCITS/ISO/IEC 27000:2018(R2019) | Information technology -- Security techniques - - Information security management systems – Overview and vocabulary |
| ISO/IEC TR 20000-5:2013 | Information technology — Service management — Part 5: Exemplar implementation plan for ISO/IEC 20000-1 |
| ISO 19011:2011 | Guidelines for auditing management systems |
| AS/NZS ISO/IEC 20000.6:2019 | Information technology - Service management Requirements for bodies providing audit and certification of service management systems |
| ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
| ISO/IEC TR 90006:2013 | Information technology — Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
| ISO/IEC 27003:2017 | Information technology — Security techniques — Information security management systems — Guidance |
| ISO/IEC 27004:2016 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
| AS/NZS ISO/IEC 20000.3:2020 | Information technology - Service management Guidance on scope definition and applicability of AS/NZS ISO/IEC 20000.1 |
| ISO 31000:2009 | Risk management — Principles and guidelines |
| AS/NZS ISO/IEC 20000.1:2019 | Information technology - Service management Service management system requirements |
| ISO/IEC 27006:2015 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems |
| ISO/IEC 27014:2013 | Information technology — Security techniques — Governance of information security |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| AS/NZS ISO/IEC 20000.10:2019 | Information technology - Service management Concepts and vocabulary |
| ISO/IEC TR 20000-9:2015 | Information technology — Service management — Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services |
| ISO/IEC TR 20000-4:2010 | Information technology — Service management — Part 4: Process reference model |
| ISO/IEC 27010:2015 | Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications |
| ISO/IEC 20000-1:2011 | Information technology — Service management — Part 1: Service management system requirements |
| ISO/IEC 20000-2:2012 | Information technology — Service management — Part 2: Guidance on the application of service management systems |
| ISO/IEC 20000-3:2012 | Information technology — Service management — Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
| ISO/IEC 27005:2011 | Information technology — Security techniques — Information security risk management |
| ISO 9000:2015 | Quality management systems — Fundamentals and vocabulary |
| ISO/IEC TR 27008:2011 | Information technology — Security techniques — Guidelines for auditors on information security controls |
| ISO/IEC TS 15504-8:2012 | Information technology — Process assessment — Part 8: An exemplar process assessment model for IT service management |
| ISO/IEC 27007:2017 | Information technology — Security techniques — Guidelines for information security management systems auditing |
| ISO/IEC 27000:2016 | Information technology — Security techniques — Information security management systems — Overview and vocabulary |
| ISO/IEC TR 20000-10:2015 | Information technology — Service management — Part 10: Concepts and terminology |
| ISO Guide 73:2009 | Risk management — Vocabulary |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.