Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

DIN EN ISO/IEC 27002 E : 2017

Current
Current

The latest, up-to-date edition.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015)
Published date

20-06-2017

National foreword<br>National Annex NA (informative) - Bibliography<br>European foreword <br>Foreword <br>0 Introduction <br>1 Scope <br>2 Normative references <br>3 Terms and definitions <br>4 Structure of this standard <br>5 Information security policies<br>6 Organization of information security<br>7 Human resource security<br>8 Asset management<br>9 Access control<br>10 Cryptography<br>11 Physical and environmental security <br>12 Operations security<br>13 Communications security<br>14 System acquisition, development and maintenance<br>15 Supplier relationships<br>16 Information security incident management<br>17 Information security aspects of business<br>&nbsp;&nbsp;&nbsp;continuity management<br>18 Compliance<br>Bibliography

Provides guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organizations information security risk environment(s).

DevelopmentNote
Supersedes DIN ISO/IEC 27002 E. (06/2017)
DocumentType
Standard
PublisherName
German Institute for Standardisation (Deutsches Institut für Normung)
Status
Current

Standards Relationship
ISO/IEC 27002:2013 Identical
EN ISO/IEC 27002:2017 Identical

DIN EN ISO 22313 E : 2016 SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE (ISO 22313:2012)
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC 27035:2011 Information technology Security techniques Information security incident management
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO 31000:2009 Risk management Principles and guidelines
ISO/IEC 27037:2012 Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence
ISO 22301:2012 Societal security Business continuity management systems Requirements
ISO/IEC 27031:2011 Information technology Security techniques Guidelines for information and communication technology readiness for business continuity
ISO/IEC 27033-1:2015 Information technology Security techniques Network security Part 1: Overview and concepts
ISO/IEC 27033-5:2013 Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
ISO/IEC 20000-1:2011 Information technology Service management Part 1: Service management system requirements
ISO/IEC 27036-3:2013 Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security
ISO/IEC 20000-2:2012 Information technology Service management Part 2: Guidance on the application of service management systems
ISO/IEC 27005:2011 Information technology Security techniques Information security risk management
ISO/IEC 29101:2013 Information technology Security techniques Privacy architecture framework
ISO/IEC 27033-4:2014 Information technology Security techniques Network security Part 4: Securing communications between networks using security gateways
DIN EN ISO/IEC 27037 E : 2016 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE (ISO/IEC 27037:2012)
ISO/IEC 27036-1:2014 Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts
ISO/IEC 27036-2:2014 Information technology Security techniques Information security for supplier relationships Part 2: Requirements
ISO/IEC TR 27008:2011 Information technology Security techniques Guidelines for auditors on information security controls
ISO/IEC 27007:2017 Information technology Security techniques Guidelines for information security management systems auditing
ISO/IEC 27033-3:2010 Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues
ISO/IEC 27033-2:2012 Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
ISO 22313:2012 Societal security Business continuity management systems Guidance
ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
DIN EN ISO 22301 E : 2014 SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO 22301:2012)
ISO 15489-1:2016 Information and documentation Records management Part 1: Concepts and principles
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 29100:2011 Information technology — Security techniques — Privacy framework

View more information
Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more