IEC > Webstore > Search > Register > Check out > Payment > Order confirmation

Publication detail

 
Reference P-ISO/IEC 27001 ed1.0 withdrawn corrigendum
> preview
Title Information technology - Security techniques - Information security management systems - Requirements
Publication date 2005-10-14
Format, price
(Swiss francs)
and language
138.- 34 pages
138.- 295 Kb
138.- 690 Kb
 
Abstract ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof.
ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties.
ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following:
- use within organizations to formulate security requirements and objectives;
- use within organizations as a way to ensure that security risks are cost effectively managed;
- use within organizations to ensure compliance with laws and regulations;
- use within an organization as a process framework for the implementation and management of controls to ensure that the specific security objectives of an organization are met;
- definition of new information security management processes;
- identification and clarification of existing information security management processes;
- use by the management of organizations to determine the status of information security management activities;
- use by the internal and external auditors of organizations to determine the degree of compliance with the policies, directives and standards adopted by an organization;
- use by organizations to provide relevant information about information security policies, directives, standards and procedures to trading partners and other organizations with whom they interact for operational or commercial reasons;
- implementation of business-enabling information security;
- use by organizations to provide relevant information about information security to customers.

See also handbook ISO/IEC 27001 for Small Businesses - Practical advice.

NEW! This publication is now available in formats compatible with popular ebook readers. Choose our ebooks package which includes:
- Standard PDF and ePub formats, compatible with most readers,
- ePub format optimized for Apple's iPad and iPhone, which allows full use of the functionalities of these devices,
- Mobipocket format, compatible with Amazon's Kindle.
Technical Committee JTC 1/SC 27 - IT security techniques  RSS
ICS Codes
35.040 Character sets and information coding
*Including coding of audio, picture, multimedia and hypermedia information, IT security techniques, encryption, bar coding, electronic signatures, etc.
 
Replaced by
 

Search

>> Advanced search

Quick access by ref. number



Basket

Your basket is empty
Your country is :
Your TVA is : You must login...

Payment

Accepted credit cards:
Prices in CHF (Swiss francs)
Request a pro forma to pay by bank transfer or cheque
Learn how to share your publications with your colleagues, using networking options
Prices in CHF (Swiss francs)
We accept the following credit cards:
To pay by bank transfer: request a pro forma
If you purchase regularly through the IEC Webstore you can open a corporate account

Just Published

>> Published in the last 30 days

Bestsellers

  1. IEC 60825-1 Ed. 3.0
  2. IEC 61010-1 Ed. 3.0
  3. IEC 62682 Ed. 1.0
  4. IEC 60601-1-2 Ed. 4.0
  5. IEC 61000-4-5 Ed. 3.0
  6. IEC 61000-4-6 Ed. 4.0
  7. IEC/TS 61400-26-2 Ed. 1.0
  8. IEC 60068-2-30 Ed. 3.0
  9. IEC 60287-1-1-am1 Ed. 2.0
  10. IEC 61000-3-2 Ed. 4.0