{"id":394125,"date":"2024-10-20T04:12:33","date_gmt":"2024-10-20T04:12:33","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-270032017-2\/"},"modified":"2024-10-26T07:51:51","modified_gmt":"2024-10-26T07:51:51","slug":"bs-iso-iec-270032017-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-270032017-2\/","title":{"rendered":"BS ISO\/IEC 27003:2017"},"content":{"rendered":"

This document provides explanation and guidance on ISO\/IEC 27001:2013.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions
4 Context of the organization
4.1 Understanding the organization and its context <\/td>\n<\/tr>\n
11<\/td>\n4.2 Understanding the needs and expectations of interested parties <\/td>\n<\/tr>\n
12<\/td>\n4.3 Determining the scope of the information security management system <\/td>\n<\/tr>\n
14<\/td>\n4.4 Information security management system
5 \u200bLeadership
5.1 \u200bLeadership and commitment <\/td>\n<\/tr>\n
16<\/td>\n5.2 \u200bPolicy <\/td>\n<\/tr>\n
17<\/td>\n5.3 Organizational roles, responsibilities and authorities <\/td>\n<\/tr>\n
18<\/td>\n6 \u200bPlanning
6.1 Actions to address risks and opportunities
6.1.1 General <\/td>\n<\/tr>\n
20<\/td>\n6.1.2 Information security risk assessment <\/td>\n<\/tr>\n
23<\/td>\n6.1.3 Information security risk treatment <\/td>\n<\/tr>\n
26<\/td>\n6.2 Information security objectives and planning to achieve them <\/td>\n<\/tr>\n
29<\/td>\n7 Support
7.1 Resources <\/td>\n<\/tr>\n
30<\/td>\n7.2 Competence <\/td>\n<\/tr>\n
31<\/td>\n7.3 Awareness <\/td>\n<\/tr>\n
32<\/td>\n7.4 Communication <\/td>\n<\/tr>\n
33<\/td>\n7.5 Documented information
7.5.1 General <\/td>\n<\/tr>\n
35<\/td>\n7.5.2 Creating and updating <\/td>\n<\/tr>\n
36<\/td>\n7.5.3 Control of documented information <\/td>\n<\/tr>\n
37<\/td>\n8 Operation
8.1 Operational planning and control <\/td>\n<\/tr>\n
39<\/td>\n8.2 Information security risk assessment
8.3 Information security risk treatment <\/td>\n<\/tr>\n
40<\/td>\n9 \u200bPerformance evaluation
9.1 \u200bMonitoring, measurement, analysis and evaluation <\/td>\n<\/tr>\n
41<\/td>\n9.2 \u200bInternal audit <\/td>\n<\/tr>\n
44<\/td>\n9.3 \u200bManagement review <\/td>\n<\/tr>\n
45<\/td>\n10 Improvement
10.1 Nonconformity and corrective action <\/td>\n<\/tr>\n
48<\/td>\n10.2 \u200bContinual improvement <\/td>\n<\/tr>\n
50<\/td>\nAnnex A (informative) Policy framework <\/td>\n<\/tr>\n
53<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Security techniques. Information security management systems. Guidance<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2017<\/td>\n54<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":394128,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[91,2641],"product_tag":[],"class_list":{"0":"post-394125","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-03-100-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/394125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/394128"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=394125"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=394125"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=394125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}