BS ISO/IEC 27013:2015
$189.07
Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Published By | Publication Date | Number of Pages |
BSI | 2015 | 50 |
If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weāre here to assist you 24/7.
Email:[email protected]
This International Standard provides guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000ā1 for those organizations that are intending to either
-
implement ISO/IEC 27001 when ISO/IEC 20000ā1 is already implemented, or vice versa,
-
implement both ISO/IEC 27001 and ISO/IEC 20000ā1 together, or
-
integrate existing management systems based on ISO/IEC 27001 and ISO/IEC 20000ā1 .
This International Standard focuses exclusively on the integrated implementation of an information security management system (ISMS) as specified in ISO/IEC 27001 and a service management system (SMS) as specified in ISO/IEC 20000ā1 .
In practice, ISO/IEC 27001 and ISO/IEC 20000ā1 can also be integrated with other management system standards, such as ISO 9001 and ISO 14001 .
Status | Withdrawn |
---|---|
Title | Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
Replaces | BS ISO/IEC 27013:2012 |
Publisher | BSI |
Committee | IST/33/1 |
Pages | 50 |
Publication Date | 2015-12-31 |
Withdrawn Date | 2021-12-01 |
Replaced By | BS ISO/IEC 27013:2021 |
ISBN | 978 0 580 86245 8 |
Standard Number | BS ISO/IEC 27013:2015 |
Identical National Standard Of | ISO/IEC 27013:2015 |
Descriptors | Vocabulary, Data processing, Data storage protection, Computer technology, Data security, Information exchange, Management, Anti-burglar measures, Computer networks, Computers |
ICS Codes | 35.030 - IT Security |
Related products
-
BS ISO/IEC 19794-14:2013+A1:2016
Information technology. Biometric data interchange formats – DNA data Published By Publication Date Number ofā¦
-
BS ISO/IEC 29115:2013
Information technology. Security techniques. Entity authentication assurance framework Published By Publication Date Number of Pagesā¦
-
BS ISO/IEC 30111:2013
Information technology. Security techniques. Vulnerability handling processes Published By Publication Date Number of Pages BSIā¦
-
BS ISO/IEC 27017:2015
Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002ā¦
-
BS ISO/IEC 27033-1:2015
Information technology. Security techniques. Network security – Overview and concepts Published By Publication Date Numberā¦
-
BS EN ISO/IEC 27043:2016
Information technology. Security techniques. Incident investigation principles and processes Published By Publication Date Number ofā¦
-
BS ISO/IEC 27031:2011
Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity Publishedā¦
-
BS ISO/IEC 27019:2017
Information technology. Security techniques. Information security controls for the energy utility industry Published By Publicationā¦
-
BS ISO/IEC 27003:2017 – TC:2020 Edition
Tracked Changes. Information technology. Security techniques. Information security management systems. Guidance Published By Publication Dateā¦
-
BS ISO/IEC 27003:2017
Information technology. Security techniques. Information security management systems. Guidance Published By Publication Date Number ofā¦
-
BS ISO/IEC 27014:2013
Information technology. Security techniques. Governance of information security Published By Publication Date Number of Pagesā¦
-
BS ISO/IEC 15962:2013
Information technology. Radio frequency identification (RFID) for item management. Data protocol: data encoding rules andā¦
-
BS ISO/IEC 27033-3:2010:2011 Edition
Information technology. Security techniques. Network security – Reference networking scenarios. Threats, design techniques and controlā¦
-
BS ISO/IEC 27011:2016:2018 Edition
Information technology. Security techniques. Code of practice for Information security controls based on ISO/IEC 27002ā¦
-
BS ISO/IEC 18450:2013
Information technology. Telecommunications and information exchange between systems. Web Services Description Language (WSDL) for CSTAā¦
-
BS ISO/IEC 27010:2015
Information technology. Security techniques. Information security management for inter-sector and inter-organizational communications Published By Publicationā¦
-
BS ISO/IEC 27010:2015 – TC:2020 Edition
Tracked Changes. Information technology. Security techniques. Information security management for inter-sector and inter-organizational communications Publishedā¦
-
BS ISO/IEC 26555:2013
Software and systems engineering. Tools and methods for product line technical management Published By Publicationā¦
-
BS ISO/IEC 18180:2013
Information technology. Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2 Published Byā¦
-
BS ISO/IEC 27003:2010
Information technology. Security techniques. Information security management system implementation guidance Published By Publication Date Numberā¦
-
BS ISO/IEC 27003:2017
Information technology. Security techniques. Information security management systems. Guidance Published By Publication Date Number ofā¦
-
BS ISO/IEC 27018:2019
Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) inā¦
-
BS ISO/IEC 15940:2013
Systems and software engineering. Software Engineering Environment Services Published By Publication Date Number of Pagesā¦
-
BS ISO/IEC 27010:2012
Information technology. Security techniques. Information security management for inter-sector and inter-organizational communications Published By Publicationā¦
-
BS ISO/IEC 27033-2:2012:2015 Edition
Information technology. Security techniques. Network security – Guidelines for the design and implementation of networkā¦
-
BS ISO/IEC 19794-11:2013+A1:2014
Information technology. Biometric data interchange formats – Signature/sign processed dynamic data Published By Publication Dateā¦
-
BS ISO/IEC 27033-5:2013
Information technology. Security techniques. Network security – Securing communications across networks using Virtual Private Networksā¦
-
BS ISO/IEC 19510:2013
Information technology. Object Management Group Business Process Model and Notation Published By Publication Date Numberā¦
-
BS ISO/IEC 27013:2015 – TC:2020 Edition
Tracked Changes. Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 andā¦
-
BS ISO/IEC 7816-4:2013+A2:2018
Identification cards. Integrated circuit cards – Organization, security and commands for interchange Published By Publicationā¦
-
BS ISO/IEC 27018:2014
Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) inā¦
-
BS ISO/IEC 27003:2017
Information technology. Security techniques. Information security management systems. Guidance Published By Publication Date Number ofā¦
-
BS ISO/IEC 26550:2013
Software and systems engineering. Reference model for product line engineering and management Published By Publicationā¦
-
BS ISO/IEC 29101:2013
Information technology. Security techniques. Privacy architecture framework Published By Publication Date Number of Pages BSIā¦
-
BS ISO/IEC 20005:2013
Information technology. Sensor networks. Services and interfaces supporting collaborative information processing in intelligent sensor networksā¦
-
BS ISO/IEC 27033-6:2016
Information technology. Security techniques. Network security – Securing wireless IP network access Published By Publicationā¦
-
BS ISO/IEC 27019:2017:2019 Edition
Information technology. Security techniques. Information security controls for the energy utility industry Published By Publicationā¦
-
BS ISO/IEC 17963:2013
Web Services for Management (WS-Management) Specification Published By Publication Date Number of Pages BSI 2013ā¦
-
BS ISO/IEC 27013:2012
Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1ā¦
-
BS ISO/IEC 29192-4:2013+A1:2016
Information technology. Security techniques. Lightweight cryptography – Mechanisms using asymmetric techniques Published By Publication Dateā¦