СИСТЕМИ ЗА УПРАВЛЕНИЕ НА ИНФОРМАЦИОННАТА СИГУРНОСТ
Информационни технологии. Методи за сигурност. Системи за управление на сигурността на информацията. Изисквания |
|
БДС EN ISO/IEC 27701:2021 (ISO/IEC 27701:2019) | Методи за сигурност. Допълнение към ISO/IEC 27001 и ISO/IEC 27702 за управление на неприкосновеността на личната информация. Изисквания и указания.
|
Информатика в здравеопазването. Управление на сигурността на информацията в здравеопазването на основата на ISO/IEC 27002 |
|
БДС ISO/IEC 27000:2014 |
Информационни технологии. Методи за сигурност. Системи за управление на сигурността на информацията. Общ преглед и рeчник |
БДС ISO/IEC 27002:2014 |
Информационни технологии. Методи за сигурност. Кодекс за добра практика за управление на сигурността на информацията |
БДС ISO/IEC 27003:2011 |
Информационни технологии. Методи за сигурност. Указания за внедряване на системи за управление на сигурността на информацията |
БДС ISO/IEC 27004:2017 |
Информационни технологии. Методи за сигурност. Управление на сигурността на информацията. Наблюдение, измерване, анализ и оценяване |
БДС ISO/IEC 27005:2012 |
Информационни технологии. Методи за сигурност. Управление на риска за сигурността на информацията |
ISO/IEC 27006:2015 |
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems |
ISO/IEC 27007:2011 |
Information technology — Security techniques — Guidelines for information security management systems auditing |
ISO/IEC TR 27008:2011 |
Information technology — Security techniques — Guidelines for auditors on information security management systems controls |
ISO/IEC 27009:2016 |
Information technology — Security techniques — Sector-specific application of ISO/IEC 27001 — Requirements |
ISO/IEC 27010:2015 |
Information technology — Security techniques — Information security management for inter-sector and inter-organisational communications |
БДС ISO/IEC 27011:2011 |
Информационни технологии. Методи за сигурност. Указания за управление на сигурността на информацията за теле-комуникационни организации, базирани на ISO/IEC 27002 |
БДС ISO/IEC 27013:2015 |
Информационни технологии. Методи за сигурност. Указания за съвместно внедряване на ISO/IEC 27001 и ISO/IEC 20000-1 |
ISO/IEC 27014:2013 |
Information technology — Security techniques — Governance of information security |
ISO/IEC TR 27015:2012 |
Information technology — Security techniques — Information security management guidelines for financial services |
ISO/IEC TR 27016:2014 |
IT Security — Security techniques — Information security management – Organizational economics |
ISO/IEC 27017:2015 |
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
ISO/IEC 27018:2014 |
Information technology — Security techniques — Code of practice for protection of Personally Identifiable Information (PII) in public clouds acting as PII processors |
ISO/IEC TR 27019:2013 |
Information technology — Security techniques — Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy industry |
ISO/IEC DIS 27021 |
Information technology — Security techniques — Competence requirements for information security management professionals |
ISO/IEC TR 27023:2015 |
Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
ISO/IEC 27031:2011 |
Information technology — Security techniques — Guidelines for information and communications technology readiness for business continuity |
ISO/IEC 27032:2012 |
Information technology — Security techniques — Guidelines for cyberse |
ISO/IEC 27033-1:2015; 2:2012; -3:2010; -4:2014; -5:2013; -6:2016 |
Information technology — Security techniques — Network security (Part 1: Overview and concepts; Part 2: Guidelines for the design and implementation of network security; Part 3: Reference networking scenarios -- Threats, design techniques and control issues; Part 4: Securing communications between networks using security gateways; Part 5: Securing communications across networks using Virtual Private Networks (VPNs); Part 6: Securing wireless IP network access) |
ISO/IEC 27034-1:2011/Cor 1:2014; -2:2015; -6:2016 |
Information technology — Security techniques — Application security (Part 1: Overview and concepts; Part 2: Organization normative framework; Part 6: Case studies) |
ISO/IEC 27035-1:2015; -2:2012; |
Information technology — Security techniques — Information security incident management (Part 1: Principles of incident management; Part 2: Guidelines to plan and prepare for incident response) |
ISO/IEC 27036-1:2014; -2:2014; -3:2013; -4:2016 |
IT Security — Security techniques — Information security for supplier relationships (Part 1: Overview and concepts; Part 2: Requirements; Part 3: Guidelines for information and communication technology supply chain security; Part 4: Guidelines for security of cloud services) |
ISO/IEC 27037:2012 |
Information technology — Security techniques — Guidelines for identification, collection, acquisition, and preservation of digital evidence |
ISO/IEC 27038:2014 |
Information technology — Security techniques — Specification for digital redaction |
ISO/IEC 27039:2015 |
Information technology — Security techniques — Selection, deployment and operation of intrusion detection and prevention systems (IDPS) |
ISO/IEC 27040:2015 |
Information technology - Security techniques - Storage security |
ISO/IEC 27041:2015 |
Information technology — Security techniques — Guidelines on assuring suitability and adequacy of incident investigative method |
ISO/IEC 27042:2015 |
Information technology — Security techniques — Guidelines for the analysis and interpretation of digital evidence |
ISO/IEC 27043:2015 |
Information technology — Security techniques — Incident investigation principles and processes |
ISO/IEC 27044 |
Information technology — Security techniques — Guidelines for security information and event management (SIEM) (DRAFT) |
ISO/IEC 27050-1:2016 |
Information technology — Security techniques — Electronic discovery Part 1: Overview and concepts |