ISO/IEC 27036-1:2014
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts
Hardcopy , PDF
English
24-03-2014
09-04-2025
ISO/IEC 27036-1:2014 is an introductory part of ISO/IEC 27036. It provides an overview of the guidance intended to assist organizations in securing their information and information systems within the context of supplier relationships. It also introduces concepts that are described in detail in the other parts of ISO/IEC 27036. ISO/IEC 27036-1:2014 addresses perspectives of both acquirers and suppliers.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
13
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy |
| Standards | Relationship |
| NBN ISO/IEC 27036-1 : 2014 | Identical |
| BS ISO/IEC 27036-1:2014 | Identical |
| INCITS/ISO/IEC 27036-1:2014(2019) | Identical |
| NEN ISO/IEC 27036-1 : 2014 | Identical |
| NS ISO/IEC 27036-1 : 2014 | Identical |
| 15/30299331 DC : 0 | BS ISO/IEC 27011 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR TELECOMMUNICATIONS ORGANIZATIONS |
| PD ISO/IEC TR 15443-1:2012 | Information technology. Security techniques. Security assurance framework Introduction and concepts |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| BS ISO/IEC 27034-2:2015 | Information technology. Security techniques. Application security Organization normative framework |
| ISO/IEC 27036-4:2016 | Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services |
| BS ISO/IEC 27002 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
| NEMA CPSP 1 : 2015 | SUPPLY CHAIN BEST PRACTICES |
| DIN EN ISO/IEC 27002 E : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
| 14/30304350 DC : 0 | BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
| BS EN ISO/IEC 27002:2017 | Information technology. Security techniques. Code of practice for information security controls |
| BS ISO/IEC 27036-4:2016 | Information technology. Security techniques. Information security for supplier relationships Guidelines for security of cloud services |
| DIN EN ISO/IEC 27002:2017-06 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
| 14/30213618 DC : 0 | BS ISO/IEC 27034-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 2: ORGANIZATION NORMATIVE FRAMEWORK |
| ISO/IEC 27034-2:2015 | Information technology — Security techniques — Application security — Part 2: Organization normative framework |
| BS ISO/IEC 27036-3:2013 | Information technology. Security techniques. Information security for supplier relationships Guidelines for information and communication technology supply chain security |
| 12/30250178 DC : 0 | BS ISO/IEC 27036-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 3: GUIDELINES FOR ICT SUPPLY CHAIN SECURITY |
| BS ISO/IEC 27017:2015 | Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
| 12/30250175 DC : 0 | BS ISO/IEC 27036-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 2: COMMON REQUIREMENTS |
| INCITS/ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
| ISO/IEC 27036-3:2013 | Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security |
| ISO/IEC 27017:2015 | Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
| 16/30275200 DC : 0 | BS ISO/IEC 27036-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 4: GUIDELINES FOR SECURITY OF CLOUD SERVICES |
| BS EN ISO 27799:2008 | Health informatics. Information security management in health using ISO/IEC 27002 |
| I.S. EN ISO/IEC 27002:2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
| I.S. ISO/IEC 27002:2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
| CEI UNI ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
| ISO/IEC TR 15443-1:2012 | Information technology — Security techniques — Security assurance framework — Part 1: Introduction and concepts |
| ISO/IEC 27011:2016 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
| EN ISO/IEC 27002:2017 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
| EN ISO 27799:2016 | Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016) |
| BS ISO/IEC 27036-2:2014 | Information technology. Security techniques. Information security for supplier relationships Requirements |
| 15/30259619 DC : 0 | BS ISO/IEC 27017 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
| ISO/IEC 27036-2:2014 | Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements |
| UNE-ISO/IEC 27002:2015 | Information technology -- Security techniques -- Code of practice for information security controls |
| UNE-EN ISO/IEC 27002:2017 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
| INCITS/ISO/IEC 27034-2:2015(R2023) | Information technology - Security techniques - Application security - Part 2: Organization normative framework |
| INCITS/ISO/IEC 27011:2016(2019) | Information technology -- Security techniques -- Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
| ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
| ISO/IEC 27035:2011 | Information technology — Security techniques — Information security incident management |
| ISO 28001:2007 | Security management systems for the supply chain — Best practices for implementing supply chain security, assessments and plans — Requirements and guidance |
| ISO/IEC 27014:2013 | Information technology — Security techniques — Governance of information security |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| ISO/IEC 20000-1:2011 | Information technology — Service management — Part 1: Service management system requirements |
| ISO/IEC 15288:2008 | Systems and software engineering — System life cycle processes |
| ISO/IEC 27005:2011 | Information technology — Security techniques — Information security risk management |
| ISO/IEC 12207:2008 | Systems and software engineering — Software life cycle processes |
| ISO 9000:2015 | Quality management systems — Fundamentals and vocabulary |
| ISO 28000:2007 | Specification for security management systems for the supply chain |
| ISO/IEC 27000:2016 | Information technology — Security techniques — Information security management systems — Overview and vocabulary |
| AS ISO/IEC/IEEE 12207:2019 | Systems and software engineering - Software life cycle processes |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.