• Shopping Cart
    There are no items in your cart

BS ISO/IEC 27002 : 2013

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS

Available format(s)

Hardcopy , PDF

Superseded date

03-31-2017

Superseded by

BS EN ISO/IEC 27002:2017

Language(s)

English

Published date

01-01-2013

US$364.65
Excluding Tax where applicable

Foreword
0 Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Structure of this standard
5 Information security policies
6 Organization of information security
7 Human resource security
8 Asset management
9 Access control
10 Cryptography
11 Physical and environmental security
12 Operations security
13 Communications security
14 System acquisition, development and maintenance
15 Supplier relationships
16 Information security incident management
17 Information security aspects of business continuity
   management
18 Compliance
Bibliography

Provides guidelines for organizational information security standards and information security management practice including the selection, implementation and management of controls taking into consideration the organization's information security risk environments(s).

Committee
IST/33
DevelopmentNote
Supersedes BS ISO/IEC 17799. AMD 17310 issued on 31-07-2007 Redesignates BS ISO/IEC 17799 as BS ISO/IEC 27002. (08/2007) Supersedes BS 7799-1(2005) & 12/30186137 DC. (10/2013) Renumbered and superseded by BS EN ISO/IEC 27002. (03/2017)
DocumentType
Standard
Pages
94
PublisherName
British Standards Institution
Status
Superseded
SupersededBy
Supersedes

BS 7984-2:2014 Keyholding and response services Lone worker response services
BS 8406:2009 Event stewarding and crowd safety. Code of practice
13/30274342 DC : 0 BS 11200 - CRISIS MANAGEMENT - GUIDANCE AND GOOD PRACTICE
BS 11200:2014 Crisis management. Guidance and good practice
16/30342526 DC : 0 BS 31111 - CYBER RISK AND RESILIENCE - GUIDE
BS 8591:2014 Remote centres receiving signals from alarm systems. Code of practice
13/30286749 DC : 0 BS 8591 - REMOTE CENTRES RECEIVING SIGNALS FROM ALARM SYSTEMS - CODE OF PRACTICE
15/30324695 DC : 0 BS 7984-1 - KEYHOLDING AND RESPONSE SERVICES - PART 1: GENERAL RECOMMENDATIONS FOR KEYHOLDING AND RESPONSE SERVICES
14/30288995 DC : 0 BS 7984-2 - KEYHOLDING AND RESPONSE SERVICES - PART 2: LONE WORKER RESPONSE SERVICE
BS 25777:2008 INFORMATION AND COMMUNICATIONS TECHNOLOGY CONTINUITY MANAGEMENT - CODE OF PRACTICE
BS 7984-1:2016 Keyholding and response services General recommendations for keyholding and response services
BIP 0117 : 2015 CLOUD COMPUTING - A PRACTICAL INTRODUCTION TO THE LEGAL ISSUES
BS 7858:2012 Security screening of individuals employed in a security environment. Code of practice

ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC 27035:2011 Information technology Security techniques Information security incident management
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO 31000:2009 Risk management Principles and guidelines
ISO/IEC 27037:2012 Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence
ISO 22301:2012 Societal security Business continuity management systems Requirements
ISO/IEC 27031:2011 Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity
ISO/IEC 27033-1:2015 Information technology Security techniques Network security Part 1: Overview and concepts
ISO/IEC 27033-5:2013 Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
ISO/IEC 20000-1:2011 Information technology Service management Part 1: Service management system requirements
ISO/IEC 27036-3:2013 Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security
ISO/IEC 20000-2:2012 Information technology Service management Part 2: Guidance on the application of service management systems
ISO/IEC 27005:2011 Information technology Security techniques Information security risk management
ISO/IEC 29101:2013 Information technology Security techniques Privacy architecture framework
ISO/IEC 27033-4:2014 Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways
ISO/IEC 27036-1:2014 Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts
ISO/IEC 27036-2:2014 Information technology Security techniques Information security for supplier relationships Part 2: Requirements
ISO/IEC TR 27008:2011 Information technology Security techniques Guidelines for auditors on information security controls
ISO/IEC 27007:2017 Information technology Security techniques Guidelines for information security management systems auditing
ISO/IEC 27033-3:2010 Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues
ISO/IEC 27033-2:2012 Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
ISO 22313:2012 Societal security Business continuity management systems Guidance
ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO 15489-1:2016 Information and documentation Records management Part 1: Concepts and principles
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 29100:2011 Information technology — Security techniques — Privacy framework

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.