NF EN ISO/IEC 27002
Information technology - Security techniques - Code of practice for information security controls
ISO/IEC 27002:2013 gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organization's information security risk environment(s). It is designed to be used by organizations that intend to: select controls within the process of implementing an Information Security Management System based on ISO/IEC 27001; implement commonly accepted information security controls; develop their own information security management guidelines.
ISO/IEC 27002:2013 gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organization's information security risk environment(s).
It is designed to be used by organizations that intend to:
- select controls within the process of implementing an Information Security Management System based on ISO/IEC 27001;
- implement commonly accepted information security controls;
- develop their own information security management guidelines.
ISO/IEC 27002:2013 gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organization's information security risk environment(s). It is designed to be used by organizations that intend to: select controls within the process of implementing an Information Security Management System based on ISO/IEC 27001; implement commonly accepted information security controls; develop their own information security management guidelines.
This document provides a reference set of generic information security controls including implementation guidance. This document is designed to be used by organizations: a) within the context of an information security management system (ISMS) based on ISO/IEC27001; b) for implementing information security controls based on internationally recognized best practices; c) for developing organization-specific information security management guidelines.
- Avant-propos
-
1 Domaine d'application
-
2 Références normatives
-
3 Termes et définitions
-
4 Structure de la présente norme
-
5 Politiques de sécurité de l'information
-
6 Organisation de la sécurité de l'information
-
7 La sécurité des ressources humaines
-
8 Gestion des actifs
-
9 Contrôle d'accès
-
10 Cryptographie
-
11 Sécurité physique et environnementale
-
12 Sécurité liée à l'exploitation
-
13 Sécurité des communications
-
14 Acquisition, développement et maintenance des systèmes d'information
-
15 Relations avec les fournisseurs
-
16 Gestion des incidents liés à la sécurité de l'information
-
17 Aspects de la sécurité de l'information dans la gestion de la continuité de l'activité
- Annexe RECTIFICATIF TECHNIQUE1
- Bibliographie
The Requirements department helps you quickly locate within the normative text:
- mandatory clauses to satisfy,
- non-essential but useful clauses to know, such as permissions and recommendations.
The identification of these types of clauses is based on the document “ISO / IEC Directives, Part 2 - Principles and rules of structure and drafting of ISO documents ”as well as on a constantly enriched list of verbal forms.
With Requirements, quickly access the main part of the normative text!
COBAZ is the simple and effective solution to meet the normative needs related to your activity, in France and abroad.
Available by subscription, CObaz is THE modular solution to compose according to your needs today and tomorrow. Quickly discover CObaz!
Request your free, no-obligation live demo
I discover COBAZ