Author name: Self Study ORg

ISO/IEC 27701:2019 – Information technology — Security techniques — Extension to ISO/IEC 27001 and to ISO/IEC 27002 for privacy information management — Requirements and guidelines – Brief Overview of Standard.

Abstract “This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a  Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization. …” Introduction Although there is substantial overlap between information security and privacy management, […]

ISO/IEC 27701:2019 – Information technology — Security techniques — Extension to ISO/IEC 27001 and to ISO/IEC 27002 for privacy information management — Requirements and guidelines – Brief Overview of Standard. Read More »

ISO/IEC 27035:2016 — Information technology — Security techniques — Information security incident management – Brief Overview of Standard.

Introduction Information security controls are imperfect in various ways: controls can be overwhelmed or undermined (e.g. by competent hackers, fraudsters, or malware), fail in service (e.g. authentication failures), work partially or poorly (e.g. slow anomaly detection), or be more or less completely missing (e.g. not [yet] fully implemented, not [yet] fully operational, or never even conceived due to

ISO/IEC 27035:2016 — Information technology — Security techniques — Information security incident management – Brief Overview of Standard. Read More »

ISO/IEC 27033:2010 – Information technology — Security techniques — Network security – Brief Overview of Standard. 

Introduction ISO/IEC 27033 is a multi-part standard replacing the five-part ISO/IEC 18028. Scope and purpose “The purpose of ISO/IEC 27033 is to provide detailed guidance on the security aspects of the management, operation and use of information system networks, and their inter-connections …” ISO/IEC 27033 provides detailed guidance on implementing the network security controls that are

ISO/IEC 27033:2010 – Information technology — Security techniques — Network security – Brief Overview of Standard.  Read More »

ISO/IEC 27032:2012— Information technology — Security techniques — Guidelines for cybersecurity – Brief Overview of Standard.

Abstract “ISO/IEC 27032:2012 provides guidance for improving the state of  Cybersecurity, drawing out the unique aspects of that activity and its  dependencies on other security domains, in particular: information security; network security; internet security; and critical information infrastructure protection (CIIP) …” Introduction Officially, ISO/IEC 27032 addresses “Cybersecurity” or “the Cyberspace security”, defined as the “preservation

ISO/IEC 27032:2012— Information technology — Security techniques — Guidelines for cybersecurity – Brief Overview of Standard. Read More »

ISO/IEC 27018:2019- Information technology — Security techniques — Code of practice for protection of Personally Identifiable Information (PII) in public clouds acting as PII processors – Brief Overview of Standard.

Abstract “This document establishes commonly accepted control objectives,  controls, and guidelines for implementing measures to protect Personally  Identifiable Information (PII) in line with the privacy principles in  ISO/IEC 29100 for the public cloud computing environment. In particular, this document specifies guidelines based on ISO/IEC  27002, taking into consideration the regulatory requirements for the  protection of

ISO/IEC 27018:2019- Information technology — Security techniques — Code of practice for protection of Personally Identifiable Information (PII) in public clouds acting as PII processors – Brief Overview of Standard. Read More »

ISO/IEC 27017:2015 / ITU-T X.1631 – Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services – Brief Overview of Standard.

Abstract “ISO/IEC 27017:2015 gives guidelines for  information security controls applicable to the provision and use of  cloud services by providing: additional implementation guidance for relevant controls specified in ISO/IEC 27002; additional controls with implementation guidance that specifically relate to cloud services. This Recommendation | International Standard provides controls and  implementation guidance for both cloud service

ISO/IEC 27017:2015 / ITU-T X.1631 – Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services – Brief Overview of Standard. Read More »

ISO/IEC 27005:2018 – Information technology — Security techniques — Information security risk management (third edition) – Brief Overview of Standard.

Abstract “This document provides guidelines for information security risk management. This document supports the general concepts specified in ISO/IEC  27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach. Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for

ISO/IEC 27005:2018 – Information technology — Security techniques — Information security risk management (third edition) – Brief Overview of Standard. Read More »

ISO/IEC 27002:2022 — Information security, cybersecurity, and privacy protection — Information security controls (third edition) – Brief Overview of Standard.

Abstract “This document provides a reference set of generic information security controls including implementation guidance. This document is  designed to be used by organisations: (a) within the context of an information security management system (ISMS) based on ISO/IEC27001; (b) for implementing information security controls based on internationally recognized best practices; [and] (c) for developing organisation-specific

ISO/IEC 27002:2022 — Information security, cybersecurity, and privacy protection — Information security controls (third edition) – Brief Overview of Standard. Read More »

ISO/IEC 27001:2013 — Information technology — Security techniques — Information security management systems — Requirements (second edition) – Brief Overview of Standard.

Abstract ”This International Standard has been prepared to provide requirements for establishing, implementing, maintaining, and continually improving an information security management system …” Introduction ISO/IEC 27001 formally specifies an Information Security Management System, a governance arrangement comprising a structured suite of activities with which to manage information risks (called ‘information security risks’ in the standard). The ISMS is an

ISO/IEC 27001:2013 — Information technology — Security techniques — Information security management systems — Requirements (second edition) – Brief Overview of Standard. Read More »

ISO 27001

The digital world we live today has given rise to the threat for security of individuals & organizational data. The intense digital activity has also given rise to 3rd party, un-authorised groups (hackers) penetrating the digital platforms / devices/ servers etc. ., to not only gain access to personal & organizational data but to steal

ISO 27001 Read More »

Shopping Cart