ISO/IEC 27042:2015
Current
The latest, up-to-date edition.
Information technology Security techniques Guidelines for the analysis and interpretation of digital evidence
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English, French
19-06-2015
ISO/IEC 27042:2015 provides guidance on the analysis and interpretation of digital evidence in a manner which addresses issues of continuity, validity, reproducibility, and repeatability. It encapsulates best practice for selection, design, and implementation of analytical processes and recording sufficient information to allow such processes to be subjected to independent scrutiny when required. It provides guidance on appropriate mechanisms for demonstrating proficiency and competence of the investigative team.
Analysis and interpretation of digital evidence can be a complex process. In some circumstances, there can be several methods which could be applied and members of the investigative team will be required to justify their selection of a particular process and show how it is equivalent to another process used by other investigators. In other circumstances, investigators may have to devise new methods for examining digital evidence which has not previously been considered and should be able to show that the method produced is "fit for purpose".
Application of a particular method can influence the interpretation of digital evidence processed by that method. The available digital evidence can influence the selection of methods for further analysis of digital evidence which has already been acquired.
ISO/IEC 27042:2015 provides a common framework, for the analytical and interpretational elements of information systems security incident handling, which can be used to assist in the implementation of new methods and provide a minimum common standard for digital evidence produced from such activities.
DocumentType |
Standard
|
Pages |
14
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Standards | Relationship |
DIN EN ISO/IEC 27042:2016-12 | Identical |
DIN EN ISO/IEC 27042 E : 2016 | Identical |
NF EN ISO/IEC 27042 : 2017 | Identical |
NBN EN ISO/IEC 27042 : 2016 | Identical |
I.S. EN ISO/IEC 27042:2016 | Identical |
PN EN ISO/IEC 27042 : 2016 | Identical |
SN EN ISO/IEC 27042 : 2016 | Identical |
UNI CEI EN ISO/IEC 27042 : 2017 | Identical |
UNE-EN ISO/IEC 27042:2016 | Identical |
BS EN ISO/IEC 27042:2016 | Identical |
CEI UNI EN ISO/IEC 27042 : 1ED 2017 | Identical |
EN ISO/IEC 27042:2016 | Identical |
INCITS/ISO/IEC 27042:2015(R2023) | Identical |
NEN ISO/IEC 27042 : 2015 | Identical |
PNE-FprEN ISO/IEC 27042 | Identical |
BS ISO/IEC 27042 : 2015 | Identical |
CSA ISO/IEC 27050-1 : 2018 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1: OVERVIEW AND CONCEPTS |
BS ISO/IEC 27035-1:2016 | Information technology. Security techniques. Information security incident management Principles of incident management |
I.S. EN ISO/IEC 27043:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES (ISO/IEC 27043:2015) |
ISO/IEC 27043:2015 | Information technology Security techniques Incident investigation principles and processes |
BS ISO/IEC 27043 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
ISO/TR 15801:2017 | Document management — Electronically stored information — Recommendations for trustworthiness and reliability |
EN ISO/IEC 27043:2016 | Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015) |
16/30287629 DC : 0 | BS ISO/IEC 27050-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1 OVERVIEW AND CONCEPTS |
PD ISO/TR 15801:2017 | Document management. Electronically stored information. Recommendations for trustworthiness and reliability |
BS EN ISO/IEC 27043:2016 | Information technology. Security techniques. Incident investigation principles and processes |
15/30267674 DC : 0 | BS ISO/IEC 27035-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 1: PRINCIPLES OF INCIDENT MANAGEMENT |
ISO/IEC 27050-1:2016 | Information technology Security techniques Electronic discovery Part 1: Overview and concepts |
ISO/IEC 27035-1:2016 | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management |
13/30260172 DC : 0 | BS ISO/IEC 27043 - INVESTIGATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
INCITS/ISO/IEC 27043 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
CAN/CSA-ISO/IEC 27035-1:18 | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management (Adopted ISO/IEC 27035-1:2016, first edition, 2016-11-01) |
ISO/IEC 17025:2005 | General requirements for the competence of testing and calibration laboratories |
ISO/IEC 27035:2011 | Information technology Security techniques Information security incident management |
ISO/IEC 27004:2016 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
ISO/IEC 27037:2012 | Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence |
ISO/IEC 17043:2010 | Conformity assessment — General requirements for proficiency testing |
ISO/IEC 27041:2015 | Information technology Security techniques Guidance on assuring suitability and adequacy of incident investigative method |
ISO/IEC 17024:2012 | Conformity assessment — General requirements for bodies operating certification of persons |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.