Please summarize in a point by point presentation the International Operating Standards (ISO/IEC 27000). There are 15 major components. Please list and summarize each.
International Standards for management systems provide a model to follow in setting up and operating a management system. This model incorporates the features on which experts in the field have reached a consensus as being the international state of the art. ISO/IEC JTC 1/SC 27 maintains an expert committee dedicated to the development of international management systems standards for information security, otherwise known as the Information Security Management System (ISMS) family of standards. Through the use of the ISMS family of standards, organizations can develop and implement a framework for managing the security of their information assets including financial information, intellectual property, and employee details, or information entrusted to them by customers or third parties. These standards can also be used to prepare for an independent assessment of their ISMS applied to the protection of information.
ISO 27000 Family of International Standards Provides the best practice recommendations on InfoSec management, risks and controls within the context of an overall ISMS. ISO 27000: Overview and Vocabulary (2014) ISO 27001: ISMS Requirements (2013) ISO 27002: Code of Practice (2013) ISO 27003: ISMS Implementation Guidance (2010) ISO 27004: ISM Measurement (2009) ISO 27005: InfoSec Risk Management (2011) ISO 27006: Requirements for Bodies Providing Audit and Certification of ISMS (2011) ISO 27007 – 27008: Guidelines for Auditing InfoSec Controls (2011) ISO 27014: Governance of InfoSec (2013) ISO 27015: ISM Guidelines for Financial Services (2012).
Benefits of ISO/IEC 27001:2013:-
Best framework for complying with information security legal, regulatory and contractual requirements.Better organizational image because of the certificate issued by acertification body.it Proves that senior management are committed to the security of the organization, including customer’s information.Builds a culture of security.
Get Answers For Free
Most questions answered within 1 hours.