ISO/IEC 20000-1:2011
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology Service management Part 1: Service management system requirements
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
03-25-2019
English, French
04-12-2011
ISO/IEC 20000-1:2011 is a service management system (SMS) standard. It specifies requirements for the service provider to plan, establish, implement, operate, monitor, review, maintain and improve an SMS. The requirements include the design, transition, delivery and improvement of services to fulfil agreed service requirements.
ISO/IEC 20000-1:2011 can be used by:
- an organization seeking services from service providers and requiring assurance that their service requirements will be fulfilled;
- an organization that requires a consistent approach by all its service providers, including those in a supply chain;
- a service provider that intends to demonstrate its capability for the design, transition, delivery and improvement of services that fulfil service requirements;
- a service provider to monitor, measure and review its service management processes and services;
- a service provider to improve the design, transition, delivery and improvement of services through the effective implementation and operation of the SMS;
- an assessor or auditor as the criteria for a conformity assessment of a service provider's SMS to the requirements in ISO/IEC 20000-1:2011.
DocumentType |
Standard
|
Pages |
26
|
PublisherName |
International Organization for Standardization
|
Status |
Withdrawn
|
SupersededBy | |
Supersedes |
Standards | Relationship |
NF ISO/IEC 20000-1 : 2012 | Identical |
NEN ISO/IEC 20000-1 : 2011 | Identical |
NS ISO/IEC 20000-1 : 2011 | Identical |
PN ISO/IEC 20000-1 : 2014 | Identical |
SN ISO/IEC 20000-1 : 2011 | Identical |
UNE-ISO/IEC 20000-1:2011 | Identical |
UNI CEI ISO/IEC 20000-1 : 2012 | Identical |
BIS IS/ISO/IEC 20000-1 : 2014 | Identical |
BS ISO/IEC 20000-1:2011 | Identical |
CEI UNI ISO/IEC 20000-1 : 2012 | Identical |
AS ISO/IEC 20000.1-2013 | Identical |
GOST R ISO/IEC 20000-1 : 2013 | Identical |
DS ISO/IEC 20000-1 : 2011 | Identical |
CSA ISO/IEC 20000-1 :2013 | Identical |
09/30184534 DC : DRAFT JAN 2009 | Identical |
CSA ISO/IEC 20000-1 : 2013 : R2017 | Identical |
UNE-EN 80001-1:2012 | Application of risk management for IT-networks incorporating medical devices - Part 1: Roles, responsibilities and activities |
15/30322573 DC : 0 | BS ISO/IEC 33071 - INFORMATION TECHNOLOGY - PROCESS ASSESSMENT - AN INTEGRATED PROCESS CAPABILITY ASSESSMENT MODEL FOR ENTERPRISE PROCESSES |
ISO/IEC 30105-5:2016 | Information technology — IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes — Part 5: Guidelines |
BS PD ISO/TR 17068 : 2012 | INFORMATION AND DOCUMENTATION - TRUSTED THIRD PARTY REPOSITORY FOR DIGITAL RECORDS |
I.S. EN 80001-1:2011 | APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 1: ROLES, RESPONSIBILITIES AND ACTIVITIES |
15/30319488 DC : 0 | BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
09/30157835 DC : 0 | BS EN ISO/IEC 80001-1 - APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 1: ROLES, RESPONSIBILITIES AND ACTIVITIES |
BS ISO/IEC 19086-1:2016 | Information technology. Cloud computing. Service level agreement (SLA) framework Overview and concepts |
BS ISO/IEC 20000-2:2012 | Information technology. Service management Guidance on the application of service management systems |
PD ISO/IEC TR 20000-5:2013 | Information technology. Service management Exemplar implementation plan for ISO/IEC 20000-1 |
10/30207796 DC : 0 | BS ISO/IEC 15289 - SOFTWARE AND SYSTEMS ENGINEERING - CONTENT OF LIFE-CYCLE INFORMATION PRODUCTS |
17/30351843 DC : 0 | BS 10754-1 - INFORMATION TECHNOLOGY - SOFTWARE TRUSTWORTHINESS - PART 1 - GOVERNANCE AND MANAGEMENT SPECIFICATION |
PD ISO/IEC TR 20000-3:2009 | Information technology. Service management Guidance on scope definition and applicability of ISO/IEC 20000-1 |
BS ISO/IEC 33071:2016 | Information technology. Process assessment. An integrated process capability assessment model for Enterprise processes |
17/30354834 DC : 0 | BS EN ISO 19011 - GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
BS ISO/IEC/IEEE 15288:2015 | Systems and software engineering. System life cycle processes |
ISO/IEC TR 29110-1:2016 | Systems and software engineering — Lifecycle profiles for Very Small Entities (VSEs) — Part 1: Overview |
S.R. CEN ISO/TS 17427:2014 | INTELLIGENT TRANSPORT SYSTEMS - COOPERATIVE SYSTEMS - ROLES AND RESPONSIBILITIES IN THE CONTEXT OF COOPERATIVE ITS BASED ON ARCHITECTURE(S) FOR COOPERATIVE SYSTEMS (ISO/TS 17427:2014) |
12/30204847 DC : 0 | BS ISO/IEC 29147 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
PD ISO/IEC TR 90006:2013 | Information technology. Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
ISO/IEC/IEEE 15289:2017 | Systems and software engineering Content of life-cycle information items (documentation) |
12/30249455 DC : 0 | BS ISO/IEC 27036-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 1: OVERVIEW AND CONCEPTS |
CAN/CSA-ISO/IEC 27031:13 (R2017) | Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity (Adopted ISO/IEC 27031:2011, first edition, 2011-03-01) |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018 | CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
ISO/IEC 27031:2011 | Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity |
BS EN ISO 19011:2011 | Guidelines for auditing management systems |
IEEE 20000-2-2013 | IEEE Standard -- Adoption of ISO/IEC 20000-2:2012, Information technology -- Service management -- Part 2: Guidance on the application of service management systems |
ISO/IEC/IEEE 15288:2015 | Systems and software engineering — System life cycle processes |
CSA ISO/IEC 24762: 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
ISO/IEC 24762:2008 | Information technology Security techniques Guidelines for information and communications technology disaster recovery services |
BS EN ISO/IEC 27000:2017 | Information technology. Security techniques. Information security management systems. Overview and vocabulary |
TR 101 552 : 1.0.0 | GUIDANCE FOR THE APPLICATION OF CONFORMITY ASSESSMENT TO ACCESSIBILITY REQUIREMENTS FOR PUBLIC PROCUREMENT OF ICT PRODUCTS AND SERVICES IN EUROPE |
ISO/IEC 27000:2018 | Information technology — Security techniques — Information security management systems — Overview and vocabulary |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/TS 17444-1:2017 | Electronic fee collection — Charging performance — Part 1: Metrics |
UNE-ISO 22301:2013 | Societal security. Business continuity management systems. Requirements |
CEN ISO/TS 17444-1:2017 | Electronic fee collection - Charging performance - Part 1: Metrics (ISO/TS 17444-1:2017) |
INCITS/ISO/IEC 27013 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
15/30299325 DC : 0 | BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
15/30285994 DC : 0 | BS ISO/IEC 30105-1 - INFORMATION TECHNOLOGY - IT ENABLED SERVICES/ BUSINESS PROCESS OUTSOURCING (ITESBPO) LIFECYCLE PROCESSES - PROCESS REFERENCE MODEL (PRM) |
10/30184538 DC : 0 | BS ISO/IEC 20000-2 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
ISO/IEC TR 20000-11:2015 | Information technology Service management Part 11: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: ITIL |
14/30273794 DC : 0 | BS ISO/IEC 16350 - SYSTEMS AND SOFTWARE ENGINEERING - APPLICATION MANAGEMENT |
BS ISO/IEC 19770-1:2017 | Information technology. IT asset management IT asset management systems. Requirements |
14/30297267 DC : 0 | BS ISO/IEC/IEEE 15288 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEM LIFE CYCLE PROCESSES |
11/30168516 DC : 0 | BS ISO/IEC 27032 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR CYBERSECURITY |
BIP 0140 : 2014 | UNDERSTANDING THE NEW ISO MANAGEMENT SYSTEM REQUIREMENTS |
BS ISO 22301 : 2012 | SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS |
BS ISO/IEC 24762:2008 | Information technology. Security techniques. Guidelines for information and communications technology disaster recovery services |
BS ISO/IEC 27036-1:2014 | Information technology. Security techniques. Information security for supplier relationships Overview and concepts |
CSA ISO/IEC 27002 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
07/30160561 DC : 0 | BS ISO/IEC 12207 - SYSTEMS AND SOFTWARE ENGINEERING - SOFTWARE LIFE CYCLE PROCESSES |
CAN/CSA-ISO/IEC 27013:16 | Information technology - Security techniques - Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 (Adopted ISO/IEC 27013:2015, second edition, 2015-12-01) |
BS ISO/IEC 27000 : 2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
DIN EN ISO 22301:2014-12 | SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO 22301:2012) |
PD ISO/IEC TS 25011:2017 | Information technology. Systems and software Quality Requirements and Evaluation (SQuaRE). Service quality models |
16/30283980 DC : 0 | BS EN ISO 9241-220 - ERGONOMICS OF HUMAN-COMPUTER INTERACTION - PART 220: PROCESSES FOR ENABLING, EXECUTING AND ASSESSING HUMAN-CENTRED DESIGN WITHIN ORGANIZATIONS |
BS ISO/IEC 30105-5:2016 | Information technology. IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes Guidelines |
PD ISO/IEC TR 20000-4:2010 | Information technology. Service management Process reference model |
BIP 0101 : 2008 | ISO/IEC 20000: AN INTRODUCTION |
BS ISO/IEC 20000-6:2017 | Information technology. Service management Requirements for bodies providing audit and certification of service management systems |
UNE-ISO/IEC 27002:2015 | Information technology -- Security techniques -- Code of practice for information security controls |
BS ISO/IEC 30134-2 : 2016 | INFORMATION TECHNOLOGY - DATA CENTRES - KEY PERFORMANCE INDICATORS - PART 2: POWER USAGE EFFECTIVENESS (PUE) |
I.S. EN ISO 22301:2014 | SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS |
BS ISO/IEC 20000-3:2012 | Information technology. Service management Guidance on scope definition and applicability of ISO/IEC 20000-1 |
ISO 19011:2011 | Guidelines for auditing management systems |
BS ISO/IEC 27002 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
EN ISO 19011:2011 COR 2011 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
AAMI TIR45 : 2012 | GUIDANCE ON THE USE OF AGILE PRACTICES IN THE DEVELOPMENT OF MEDICAL DEVICE SOFTWARE |
UNE-EN ISO/IEC 27002:2017 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
ISO/IEC 14763-2:2012 | Information technology Implementation and operation of customer premises cabling Part 2: Planning and installation |
BS ISO/IEC 29147:2014 | Information technology. Security techniques. Vulnerability disclosure |
BS ISO/IEC/IEEE 15289:2011 | Systems and software engineering. Content of life-cycle information products (documentation) |
BS ISO/IEC/IEEE 15289:2019 | Systems and software engineering. Content of life-cycle information items (documentation) |
S.R. CEN/CLC/ETSI/TR 101 552:2014 | GUIDANCE FOR THE APPLICATION OF CONFORMITY ASSESSMENT TO ACCESSIBILITY REQUIREMENTS FOR PUBLIC PROCUREMENT OF ICT PRODUCTS AND SERVICES IN EUROPE |
CAN/CSA-ISO/IEC 16350:16 | Information technology Systems and software engineering Application management (Adopted ISO/IEC 16350:2015, first edition, 2015-08-01) |
ISO/IEC 19086-1:2016 | Information technology Cloud computing Service level agreement (SLA) framework Part 1: Overview and concepts |
BS EN ISO 22301:2014 | Societal security. Business continuity management systems. Requirements |
ISO/IEC 27013:2015 | Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
VDI/VDE 2182 Blatt 1:2011-01 | IT-security for industrial automation - General model |
UNE-ISO/IEC 20000-2:2015 | Information technology. Service management. Part 2: Guidance on the application of service management systems |
INCITS/ISO/IEC 24762 : 2009(R2014) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
PD ISO/IEC TR 20000-12:2016 | Information technology. Service management Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC® |
ANSI/AAMI/IEC 80001-1:2010 | APPLICATION OF RISK MANAGEMENT FOR IT NETWORKS INCORPORATING MEDICAL DEVICES - PART 1: ROLES, RESPONSIBILITIES AND ACTIVITIES |
DIN EN ISO/IEC 27002 E : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
14/30266434 DC : 0 | BS ISO/IEC 17788 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - OVERVIEW AND VOCABULARY |
ISO/IEC TR 38505-2:2018 | Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management |
BS EN 80001-1:2011 | Application of risk management for IT-networks incorporating medical devices Roles, responsibilities and activities |
IEEE 828-2012 | IEEE Standard for Configuration Management in Systems and Software Engineering |
BS EN ISO/IEC 27002:2017 | Information technology. Security techniques. Code of practice for information security controls |
UNE-ISO/IEC 20000-3:2015 | Information technology. Service management. Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
BS ISO/IEC 30105-1:2016 | Information technology. IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes Process reference model (PRM) |
DIN ISO/IEC 17788:2016-04 | INFORMATION TECHNOLOGY - CLOUD COMPUTING - OVERVIEW AND VOCABULARY (ISO/IEC 17788:2014) |
PD CEN ISO/TS 17427:2014 | Intelligent transport systems. Cooperative systems. Roles and responsibilities in the context of cooperative ITS based on architecture(s) for cooperative systems |
12/30257208 DC : DRAFT FEB 2012 | BS ISO/IEC 20000-3 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
16/30349524 DC : 0 | BS EN ISO 17427-1 - INTELLIGENT TRANSPORT SYSTEMS - COOPERATIVE ITS - PART 1: ROLES AND RESPONSIBILITIES IN THE CONTEXT OF CO-OPERATIVE ITS ARCHITECTURE(S) |
BIP 0103 : 2008 | ISO/IEC 20000: A POCKET GUIDE |
BS TICKITPLUS - ASSESSORS & PRACTITIONER : 2011 | REQUIREMENTS FOR ASSESSORS AND PRACTITIONERS - THE TICKITPLUS SCHEME |
BS ISO/IEC 27032:2012 | Information technology. Security techniques. Guidelines for cybersecurity |
DIN EN ISO/IEC 27002:2017-06 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
CSA ISO/IEC 20000-2 : 2013 : R2017 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
CSA ISO/IEC 27031 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
CSA ISO 19011 : 2012 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
ISO/IEC/IEEE 12207:2017 | Systems and software engineering — Software life cycle processes |
ISO/IEC/IEEE 26531:2015 | Systems and software engineering — Content management for product life-cycle, user and service management documentation |
CAN/CSA-ISO/IEC 17788:16 | Information technology Cloud computing Overview and vocabulary (Adopted ISO/IEC 17788:2014, first edition, 2014-10-15) |
ISO/IEC TR 29110-5-3:2018 | Systems and software engineering — Lifecycle profiles for Very Small Entities (VSEs) — Part 5-3: Service delivery guidelines |
I.S. EN ISO/IEC 27000:2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY (ISO/IEC 27000:2016) |
ISO/IEC 30134-2:2016 | Information technology Data centres Key performance indicators Part 2: Power usage effectiveness (PUE) |
ISO/IEC 33071:2016 | Information technology — Process assessment — An integrated process capability assessment model for Enterprise processes |
ISO/IEC TR 90006:2013 | Information technology Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
ISO/IEC TS 25011:2017 | Information technology — Systems and software Quality Requirements and Evaluation (SQuaRE) — Service quality models |
CSA ISO 19011 : 2012 : R2017 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
ISO/IEC TR 20000-10:2015 | Information technology Service management Part 10: Concepts and terminology |
ISO/IEC TS 33072:2016 | Information technology — Process assessment — Process capability assessment model for information security management |
ISO/TR 17068:2012 | Information and documentation - Trusted third party repository for digital records |
ISO/IEC 27032:2012 | Information technology — Security techniques — Guidelines for cybersecurity |
ISO/IEC 27036-1:2014 | Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts |
ISO 5127:2017 | Information and documentation Foundation and vocabulary |
ISO/IEC TS 15504-8:2012 | Information technology Process assessment Part 8: An exemplar process assessment model for IT service management |
ISO/TS 17427:2014 | Intelligent transport systems Cooperative systems Roles and responsibilities in the context of cooperative ITS based on architecture(s) for cooperative systems |
UNI/TS 11465-1 : 2012 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - PART 1: REQUIREMENTS FOR IMPLEMENTATION AND MANAGEMENT |
UNI CEN ISO/TS 17444-1 : 2012 | ELECTRONIC FEE COLLECTION - CHARGING PERFORMANCE - PART 1: METRICS |
08/30128080 DC : 0 | ISO/IEC 19770-2 - SOFTWARE ASSET MANAGEMENT - PART 2: SOFTWARE IDENTIFICATION TAG |
UNI CEI ISO/IEC TR 20000-3 : 2010 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
PD ISO/IEC TR 33014:2013 | Information technology. Process assessment. Guide for process improvement |
12/30250178 DC : 0 | BS ISO/IEC 27036-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 3: GUIDELINES FOR ICT SUPPLY CHAIN SECURITY |
BS ISO/IEC/IEEE 26531:2015 | Systems and software engineering. Content management for product lifecycle, user and service management documentation |
CAN/CSA-ISO/IEC/IEEE 15288:16 | Systems and software engineering - System life cycle processes (Adopted ISO/IEC/IEEE 15288:2015, first edition, 2015-05-15) |
CSA INFORMATION SECURITY PACKAGE : 2018 | CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
BIP 0102 : 2008 | IMPLEMENTING ISO/IEC 20000 CERTIFICATION: THE ROADMAP |
15/30312480 DC : 0 | BS ISO/IEC 30105-4 - INFORMATION TECHNOLOGY - IT ENABLED SERVICES - BUSINESS PROCESS OUTSOURCING (ITES-BPO) LIFECYCLE PROCESSES - PART 4: TERMS AND CONCEPTS |
PD IEC/TR 80001-2-2:2012 | Application of risk management for IT-networks incorporating medical devices Guidance for the disclosure and communication of medical device security needs, risks and controls |
14/30296542 DC : 0 | BS ISO/IEC/IEEE 23026 - SYSTEMS AND SOFTWARE ENGINEERING - ENGINEERING AND MANAGEMENT OF WEBSITES FOR SYSTEMS, SOFTWARE, AND SERVICES INFORMATION |
INCITS/ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
BIP 0071 : 2014 | GUIDELINES ON REQUIREMENTS AND PREPARATION FOR ISMS CERTIFICATION BASED ON ISO/IEC 27001 |
BS ISO/IEC 17788:2014 | Information technology. Cloud computing. Overview and vocabulary |
BS ISO 5127:2017 | Information and documentation. Foundation and vocabulary |
UNE-ISO/TR 17068:2013 | Information and documentation. Trusted third party repository for digital records. |
CEI UNI ISO/IEC TR 20000-3 : 2011 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
14/30285107 DC : 0 | BS ISO/IEC/IEEE 26531 - SYSTEMS AND SOFTWARE ENGINEERING - CONTENT MANAGEMENT FOR PRODUCT LIFE-CYCLE, USER AND SERVICE MANAGEMENT DOCUMENTATION |
ISO/IEC 27036-3:2013 | Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security |
UNI CEN ISO/TS 17427 : 2014 | INTELLIGENT TRANSPORT SYSTEMS - COOPERATIVE SYSTEMS - ROLES AND RESPONSIBILITIES IN THE CONTEXT OF COOPERATIVE ITS BASED ON ARCHITECTURE(S) FOR COOPERATIVE SYSTEMS |
16/30316173 DC : 0 | BS ISO/IEC 19086-1 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS |
BS ISO/IEC 27031:2011 | Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity |
17/30329617 DC : 0 | BS ISO/IEC 29110-4-3 - SYSTEMS AND SOFTWARE ENGINEERING - LIFECYCLE PROFILES FOR VERY SMALL ENTITIES (VSES) - PART 4-3: SERVICE DELIVERY - PROFILE SPECIFICATION |
BIS IS/ISO 19011 : 2011(R2016) | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
BS ISO/IEC 16350:2015 | Information technology. Systems and software engineering. Application management |
16/30326000 DC : 0 | BS ISO/IEC 19770-1 - INFORMATION TECHNOLOGY - IT ASSET MANAGEMENT - PART 1: IT ASSET MANAGEMENT SYSTEMS - REQUIREMENTS |
CSA ISO/IEC 20000-2:2013 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
CSA ISO/IEC TR 20000-5 : 2015 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 5: EXEMPLAR IMPLEMENTATION PLAN FOR ISO/IEC 20000-1 |
ISO/IEC 19770-1:2017 | Information technology — IT asset management — Part 1: IT asset management systems — Requirements |
UNE-ISO/IEC 27000:2014 | Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary |
SR 003 391 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
GS ISI 001-2 : 1.1.2 | INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1 |
I.S. EN ISO/IEC 27002:2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
I.S. ISO/IEC 27002:2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/IEC/IEEE 23026:2015 | Systems and software engineering — Engineering and management of websites for systems, software, and services information |
ISO/TR 14639-2:2014 | Health informatics Capacity-based eHealth architecture roadmap Part 2: Architectural components and maturity model |
CEI EN 80001-1 : 2016 | APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 1: ROLES, RESPONSIBILITIES AND ACTIVITIES |
CEI UNI ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
UNE-ISO/IEC TR 20000-3:2011 IN | Information technology. Service management. Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
UNI CEI ISO/IEC 20000-2 : 2010 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: CODE OF PRACTICE |
ISO/IEC 29147:2014 | Information technology Security techniques Vulnerability disclosure |
UNI EN ISO 22301 : 2014 | SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/IEC 30105-1:2016 | Information technology — IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes — Part 1: Process reference model (PRM) |
IEC TR 80001-2-2:2012 | Application of risk management for IT-networks incorporating medical devices - Part 2-2: Guidance for the disclosure and communication of medical device security needs, risks and controls |
IEC 80001-1:2010 | Application of risk management for IT-networks incorporating medical devices - Part 1: Roles, responsibilities and activities |
ISO 22301:2012 | Societal security Business continuity management systems Requirements |
ISO/IEC TR 20000-4:2010 | Information technology Service management Part 4: Process reference model |
UNE-EN ISO 22301:2015 | Societal security - Business continuity management systems - Requirements (ISO 22301:2012) |
ISO/IEC 20000-3:2012 | Information technology Service management Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
ISO/IEC 20000-2:2012 | Information technology Service management Part 2: Guidance on the application of service management systems |
ISO/IEC TR 20000-5:2013 | Information technology Service management Part 5: Exemplar implementation plan for ISO/IEC 20000-1 |
EN ISO/IEC 27000:2017 | Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016) |
EN ISO/IEC 27002:2017 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO 22301:2014 | Societal security - Business continuity management systems - Requirements (ISO 22301:2012) |
ISO/IEC TR 33014:2013 | Information technology Process assessment Guide for process improvement |
I.S. EN ISO 19011:2011 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
PD ISO/IEC TR 29110-1:2016 | Systems and software engineering. Lifecycle profiles for Very Small Entities (VSEs) Overview |
AAMI IEC TIR 80001-2-2 : 2012 | APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-2: GUIDANCE FOR THE DISCLOSURE AND COMMUNICATION OF MEDICAL DEVICE SECURITY NEEDS, RISKS AND CONTROLS |
ISO/IEC TR 20000-9:2015 | Information technology Service management Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services |
PD CEN ISO/TS 17444-1:2012 | Electronic fee collection. Charging performance Metrics |
BS ISO/IEC 27036-3:2013 | Information technology. Security techniques. Information security for supplier relationships Guidelines for information and communication technology supply chain security |
ABS 0253 : 2016 | GUIDE FOR SOFTWARE SYSTEMS VERIFICATION ABS CYBERSAFETY[TM] VOLUME 4 |
CEI UNI ISO/IEC 20000-2 : 2011 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: CODE OF PRACTICE |
PD ISO/IEC TR 20000-11:2015 | Information technology. Service management Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: ITIL® |
BS ISO/IEC/IEEE 23026:2015 | Systems and software engineering. Engineering and management of websites for systems, software, and services information |
16/30338037 DC : 0 | BS ISO/IEC 30754 - INFORMATION TECHNOLOGY - SOFTWARE TRUSTWORTHINESS - GOVERNANCE AND MANAGEMENT - SPECIFICATION |
CSA ISO/IEC 24762 : 2008 : R2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
14/30255584 DC : 0 | BS ISO 5127 - INFORMATION AND DOCUMENTATION - FOUNDATION AND VOCABULARY |
BS ISO/IEC 30105-2:2016 | Information technology. IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes Process assessment model (PAM) |
PD ISO/IEC TR 20000-9:2015 | Information technology. Service management Guidance on the application of ISO/IEC 20000-1 to cloud services |
CSA ISO/IEC 27000 : 2018 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
BS ISO/IEC 30105-4:2016 | Information technology. IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes Terms and concepts |
ISO/IEC TR 20000-3:2009 | Information technology — Service management — Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
ISO/IEC 20000-6:2017 | Information technology — Service management — Part 6: Requirements for bodies providing audit and certification of service management systems |
PD ISO/IEC TS 33072:2016 | Information technology. Process assessment. Process capability assessment model for information security management |
ISO/IEC 17788:2014 | Information technology — Cloud computing — Overview and vocabulary |
ISO/IEC TR 20000-12:2016 | Information technology Service management Part 12: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC |
PD ISO/TR 14639-2:2014 | Health informatics. Capacity-based eHealth architecture roadmap Architectural components and maturity model |
PD ISO/IEC TR 20000-10:2015 | Information technology. Service management Concepts and terminology |
11/30207802 DC : 0 | BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
13/30277600 DC : 0 | BS ISO 37500 - GUIDANCE ON OUTSOURCING |
BS ISO/IEC 27013:2015 | Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
ISO/IEC 30105-4:2016 | Information technology — IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes — Part 4: Terms and concepts |
S.R. CEN ISO/TS 17444-1:2017 | ELECTRONIC FEE COLLECTION - CHARGING PERFORMANCE - PART 1: METRICS (ISO/TS 17444-1:2017) |
ISO/IEC 30105-2:2016 | Information technology — IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes — Part 2: Process assessment model (PAM) |
UNI EN ISO 19011 : 2012 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
UNI CEI ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ABS 0251 : 2016 | CYBERSECURITY IMPLEMENTATION FOR THE MARINE AND OFFSHORE INDUSTRIES - CYBERSAFETY[TM] VOLUME 2 |
UNE-EN ISO 19011:2012 | Guidelines for auditing management systems (ISO 19011:2011) |
ISO/IEC 16350:2015 | Information technology Systems and software engineering Application management |
CEN ISO/TS 17427:2014 | Intelligent transport systems - Cooperative systems - Roles and responsibilities in the context of cooperative ITS based on architecture(s) for cooperative systems (ISO/TS 17427:2014) |
EN 80001-1:2011 | Application of risk management for IT-networks incorporating medical devices - Part 1: Roles, responsibilities and activities |
CAN/CSA-ISO/IEC TR 29110-1:18 | Systems and software engineering — Lifecycle profiles for Very Small Entities (VSEs) — Part 1: Overview (Adopted ISO/IEC TR 29110-1:2016, second edition, 2016-06-15) |
CAN/CSA-ISO/IEC 30105-2:18 | Information technology — IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes — Part 2: Process assessment model (PAM) (Adopted ISO/IEC 30105-2:2016, first edition, 2016-11-15) |
CAN/CSA-ISO/IEC 30105-5:18 | Information technology — IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes — Part 5: Guidelines (Adopted ISO/IEC 30105-5:2016, first edition, 2016-11-15) |
CAN/CSA-ISO/IEC 30105-4:18 | Information technology — IT Enabled Services- Business Process Outsourcing (ITES-BPO) lifecycle processes — Part 4: Terms and concepts (Adopted ISO/IEC 30105-4:2016, first edition, 2016-11-15) |
CAN/CSA-ISO/IEC 19086-1:18 | Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts (Adopted ISO/IEC 19086-1:2016, first edition, 2016-09-15) |
CSA ISO/IEC 27003 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CAN/CSA-ISO/IEC TS 33072:18 | Information technology ? Process assessment ? Process capability assessment model for information security management (Adopted ISO/IEC TS 33072:2016, first edition, 2016-07-15, corrected version 2016-09-01) |
CAN/CSA-ISO/IEC 30134-2:18 | Information technology — Data centres — Key performance indicators — Part 2: Power usage effectiveness (PUE) (Adopted ISO/IEC 30134-2:2016, first edition, 2016-04-15) |
CAN/CSA-ISO/IEC TR 20000-12:18 | Information technology — Service management — Part 12: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC (Adopted ISO/IEC TR 20000-12:2016, first edition, 2016-10-01) |
CSA ISO/IEC 27003 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CSA ISO/IEC 19770-1 :2013 | INFORMATION TECHNOLOGY - SOFTWARE ASSET MANAGEMENT - PART 1: PROCESSES AND TIERED ASSESSMENT OF CONFORMANCE |
CAN/CSA-ISO/IEC 30105-1:18 | Information technology — IT Enabled Services- Business Process Outsourcing (ITES-BPO) lifecycle processes — Part 1: Process reference model (PRM) (Adopted ISO/IEC 30105-1:2016, first edition, 2016-11-15) |
CSA ISO/IEC 19770-1 : 2013 : R2017 | INFORMATION TECHNOLOGY - SOFTWARE ASSET MANAGEMENT - PART 1: PROCESSES AND TIERED ASSESSMENT OF CONFORMANCE |
ISO/IEC TR 20000-5:2013 | Information technology Service management Part 5: Exemplar implementation plan for ISO/IEC 20000-1 |
ISO 19011:2011 | Guidelines for auditing management systems |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC 15504-3:2004 | Information technology Process assessment Part 3: Guidance on performing an assessment |
ISO 31000:2009 | Risk management Principles and guidelines |
ISO/IEC/IEEE 24765:2017 | Systems and software engineering — Vocabulary |
ISO/IEC TR 20000-4:2010 | Information technology Service management Part 4: Process reference model |
ISO/IEC 15504-2:2003 | Information technology Process assessment Part 2: Performing an assessment |
ISO/IEC 19770-1:2012 | Information technology Software asset management Part 1: Processes and tiered assessment of conformance |
ISO/IEC 15288:2008 | Systems and software engineering — System life cycle processes |
ISO/IEC TR 20000-3:2009 | Information technology — Service management — Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
ISO 10002:2014 | Quality management Customer satisfaction Guidelines for complaints handling in organizations |
ISO/IEC 20000-2:2012 | Information technology Service management Part 2: Guidance on the application of service management systems |
ISO 9004:2009 | Managing for the sustained success of an organization A quality management approach |
ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management |
AS ISO/IEC 17788:2020 | Information technology - Cloud computing - Overview and vocabulary |
ISO 9001:2015 | Quality management systems — Requirements |
ISO 9000:2015 | Quality management systems — Fundamentals and vocabulary |
ISO/IEC 15504-1:2004 | Information technology Process assessment Part 1: Concepts and vocabulary |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
ISO 10007:2017 | Quality management — Guidelines for configuration management |
AS ISO/IEC/IEEE 12207:2019 | Systems and software engineering - Software life cycle processes |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.