One or more files are associated with this standard. After your purchase, you will find it (them) directly from your customer area, in the same place as the standard.
NF EN ISO/IEC 27001
- Free consultation sponsored by ANS (Digital Health Agency)
Information technology - Security techniques - Information security management systems - Requirements
ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001:2013 are generic and are intended to be applicable to all organizations, regardless of type, size or nature.
Collections
Publication date
Number of pages
Reference
ICS Codes
Classification index
Print number
International kinship
European kinship
ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001:2013 are generic and are intended to be applicable to all organizations, regardless of type, size or nature.
ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001:2013 are generic and are intended to be applicable to all organizations, regardless of type, size or nature.
This document specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. This document also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in this document are generic and are intended to be applicable to all organizations, regardless of type, size or nature. Excluding any of the requirements specified in Clauses 4 to 10 is not acceptable when an organization claims conformity to this document.
- Avant-propos
-
1 Domaine d'application
-
2 Références normatives
-
3 Termes et définitions
-
0 Introduction
-
4 Contexte de l'organisation
-
5 Leadership
-
6 Planification
-
7 Support
-
8 Fonctionnement
-
9 Évaluation des performances
-
10 Amélioration
- Annexe A (normative) Objectifs et mesures de référence
- Annexe RECTIFICATIF TECHNIQUE1
- Annexe RECTIFICATIF TECHNIQUE1
- Annexe RECTIFICATIF TECHNIQUE2
- Annexe RECTIFICATIF TECHNIQUE2
- Bibliographie
The Requirements department helps you quickly locate within the normative text:
- mandatory clauses to satisfy,
- non-essential but useful clauses to know, such as permissions and recommendations.
The identification of these types of clauses is based on the document “ISO / IEC Directives, Part 2 - Principles and rules of structure and drafting of ISO documents ”as well as on a constantly enriched list of verbal forms.
With Requirements, quickly access the main part of the normative text!
COBAZ is the simple and effective solution to meet the normative needs related to your activity, in France and abroad.
Available by subscription, CObaz is THE modular solution to compose according to your needs today and tomorrow. Quickly discover CObaz!
Request your free, no-obligation live demo
I discover COBAZ