BS ISO/IEC 27036-2:2014
$189.07
Information technology. Security techniques. Information security for supplier relationships – Requirements
Published By | Publication Date | Number of Pages |
BSI | 2014 | 50 |
If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]
This part of ISO/IEC 27036 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships.
These requirements cover any procurement and supply of products and services, such as manufacturing or assembly, business process procurement, software and hardware components, knowledge process procurement, Build-Operate-Transfer and cloud computing services.
These requirements are intended to be applicable to all organizations, regardless of type, size and nature.
To meet these requirements, an organization should have already internally implemented a number of foundational processes, or be actively planning to do so. These processes include, but are not limited to, the following: governance, business management, risk management, operational and human resources management, and information security.
Status | Withdrawn |
---|---|
Title | Information technology. Security techniques. Information security for supplier relationships – Requirements |
Publisher | BSI |
Committee | IST/33/4 |
Pages | 50 |
Publication Date | 2014-07-31 |
Withdrawn Date | 2022-08-05 |
Replaced By | BS ISO/IEC 27036-2:2022 |
ISBN | 978 0 580 76089 1 |
Standard Number | BS ISO/IEC 27036-2:2014 |
Identical National Standard Of | ISO/IEC 27036-2:2014 |
Descriptors | Data security, Open systems interconnection, Communication networks, Information exchange, Data processing, Computer technology, Computer networks |
ICS Codes | 35.030 - IT Security |
Related products
-
BS ISO/IEC 27036-3:2013
Information technology. Security techniques. Information security for supplier relationships – Guidelines for information and communication…
-
BS ISO/IEC 27006:2015
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management…
-
BS ISO/IEC 27006:2007
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management…
-
BS ISO/IEC 27033-2:2012:2015 Edition
Information technology. Security techniques. Network security – Guidelines for the design and implementation of network…
-
BS EN ISO/IEC 27006-1:2024
Information security, cybersecurity and privacy protection. Requirements for bodies providing audit and certification of information…
-
BS ISO/IEC 27035-1:2023
Information technology. Information security incident management – Principles and process Published By Publication Date Number…
-
BS ISO/IEC 27032:2023
Cybersecurity. Guidelines for Internet security Published By Publication Date Number of Pages BSI 2023 38
-
BS ISO/IEC 27034-1:2011:2014 Edition
Information technology. Security techniques. Application security – Overview and concepts Published By Publication Date Number…
-
BS ISO/IEC 27036-4:2016
Information technology. Security techniques. Information security for supplier relationships – Guidelines for security of cloud…
-
BS ISO/IEC 27006:2011:2012 Edition
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management…
-
BS ISO/IEC 27036-1:2014
Information technology. Security techniques. Information security for supplier relationships – Overview and concepts Published By…
-
BS ISO 27306:2016
Metallic materials. Method of constraint loss correction of CTOD fracture toughness for fracture assessment of…
-
BS EN ISO/IEC 27006:2020 2021
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management…
-
BS ISO/IEC 27034-7:2018
Information technology. Application security – Assurance prediction framework Published By Publication Date Number of Pages…
-
BS EN ISO/IEC 27006:2020 2021
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management…
-
BS EN ISO/IEC 27006:2020
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management…
-
BS ISO/IEC 27039:2015:2018 Edition
Information technology. Security techniques. Selection, deployment and operations of intrusion detection and prevention systems (IDPS)…
-
BS ISO/IEC 27033-3:2010:2011 Edition
Information technology. Security techniques. Network security – Reference networking scenarios. Threats, design techniques and control…
-
BS ISO/IEC 27035-1:2016
Information technology. Security techniques. Information security incident management – Principles of incident management Published By…
-
BS ISO/IEC 27033-4:2014
Information technology. Security techniques. Network security – Securing communications between networks using security gateways Published…
-
BS ISO/IEC 27006:2015+A1:2020
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management…
-
BS ISO/IEC 27032:2012
Information technology. Security techniques. Guidelines for cybersecurity Published By Publication Date Number of Pages BSI…
-
BS ISO/IEC 27034-2:2015
Information technology. Security techniques. Application security – Organization normative framework Published By Publication Date Number…
-
BS EN ISO/IEC 27037:2016
Information technology. Security techniques. Guidelines for identification, collection, acquisition and preservation of digital evidence Published…
-
BS ISO/IEC 27033-1:2009:2010 Edition
Information technology. Security techniques. Network security – Overview and concepts Published By Publication Date Number…
-
BS ISO/IEC 27035-2:2016
Information technology. Security techniques. Information security incident management – Guidelines to plan and prepare for…
-
BS ISO/IEC 27035:2011
Information technology. Security techniques. Information security incident management Published By Publication Date Number of Pages…
-
BS ISO/IEC 27033-1:2015
Information technology. Security techniques. Network security – Overview and concepts Published By Publication Date Number…
-
BS EN ISO/IEC 27038:2016
Information technology. Security techniques. Specification for digital redaction Published By Publication Date Number of Pages…
-
BS ISO 27306:2009 2010
Metallic materials. Method of constraint loss correction of CTOD fracture toughness for fracture assessment of…
-
BS EN ISO/IEC 29147:2020
Information technology. Security techniques. Vulnerability disclosure Published By Publication Date Number of Pages BSI 2020…
-
BS ISO/IEC 27036-1:2021
Cybersecurity. Supplier relationships – Overview and concepts Published By Publication Date Number of Pages BSI…
-
BS ISO/IEC 27033-5:2013
Information technology. Security techniques. Network security – Securing communications across networks using Virtual Private Networks…
-
BS ISO/IEC 27031:2011
Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity Published…
-
BS EN ISO 22036:2024
Environmental solid matrices. Determination of elements using inductively coupled plasma optical emission spectrometry (ICP-OES) Published…
-
BS ISO/IEC 27036-2:2022
Cybersecurity. Supplier relationships – Requirements Published By Publication Date Number of Pages BSI 2022 50
-
BS ISO/IEC 27033-6:2016
Information technology. Security techniques. Network security – Securing wireless IP network access Published By Publication…
-
BS ISO/IEC 27034-6:2016
Information technology. Security techniques. Application security – Case studies Published By Publication Date Number of…
-
BS ISO 5718:2002
Harvesting equipment. Blades for agricultural rotary mowers. Requirements Published By Publication Date Number of Pages…
-
BS ISO/IEC 27034-3:2018
Information technology. Application security – Application security management process Published By Publication Date Number of…