{"id":416394,"date":"2024-10-20T06:10:30","date_gmt":"2024-10-20T06:10:30","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-270012022\/"},"modified":"2024-10-26T11:28:18","modified_gmt":"2024-10-26T11:28:18","slug":"bs-iso-iec-270012022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-270012022\/","title":{"rendered":"BS ISO\/IEC 27001:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 \u200bScope 2 \u200bNormative references 3 \u200bTerms and definitions 4 \u200bContext of the organization 4.1 \u200bUnderstanding the organization and its context 4.2 \u200bUnderstanding the needs and expectations of interested parties <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4.3 \u200bDetermining the scope of the information security management system 4.4 \u200bInformation security management system 5 \u200bLeadership 5.1 \u200bLeadership and commitment <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5.2 \u200bPolicy 5.3 \u200bOrganizational roles, responsibilities and authorities 6 \u200bPlanning 6.1 \u200bActions to address risks and opportunities 6.1.1 \u200bGeneral <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6.1.2 \u200bInformation security risk assessment 6.1.3 \u200bInformation security risk treatment <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.2 \u200bInformation security objectives and planning to achieve them <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 7 \u200bSupport 7.1 \u200bResources 7.2 \u200bCompetence 7.3 \u200bAwareness 7.4 \u200bCommunication 7.5 \u200bDocumented information 7.5.1 \u200bGeneral <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7.5.2 \u200bCreating and updating 7.5.3 \u200bControl of documented information 8 \u200bOperation 8.1 \u200bOperational planning and control <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 8.2 \u200bInformation security risk assessment 8.3 \u200bInformation security risk treatment 9 \u200bPerformance evaluation 9.1 \u200bMonitoring, measurement, analysis and evaluation 9.2 \u200bInternal audit 9.2.1 General <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 9.2.2 Internal audit programme 9.3 \u200bManagement review 9.3.1 General 9.3.2 Management review inputs 9.3.3 Management review results <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 10 \u200bImprovement 10.1 \u200bContinual improvement 10.2 \u200bNonconformity and corrective action <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Annex A (normative) Information security controls reference <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Information security management systems. Requirements<\/b><\/p>\n |