{"id":372214,"date":"2024-10-20T02:28:14","date_gmt":"2024-10-20T02:28:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-ts-270222021\/"},"modified":"2024-10-26T04:18:23","modified_gmt":"2024-10-26T04:18:23","slug":"bsi-pd-iso-iec-ts-270222021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-ts-270222021\/","title":{"rendered":"BSI PD ISO\/IEC TS 27022:2021"},"content":{"rendered":"
This document defines a process reference model (PRM) for the domain of information security management, which is meeting the criteria defined in ISO\/IEC 33004 for process reference models (see Annex A). It is intended to guide users of ISO\/IEC 27001 to:<\/p>\n
incorporate the process approach as described by ISO\/IEC 27000:2018, 4.3, within the ISMS;<\/p>\n<\/li>\n
be aligned to all the work done within other standards of the ISO\/IEC 27000 family from the perspective of the operation of ISMS processes<\/p>\n<\/li>\n
support users in the operation of an ISMS \u2013 this document is complementing the requirementsoriented perspective of ISO\/IEC 27003 with an operational, process-oriented point of view.<\/p>\n<\/li>\n<\/ul>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 4 Structure and usage of this document <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 5 Overview <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6 Management processes 6.1 General <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.2 Information security governance\/management interface process <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7 Core processes 7.1 General 7.2 Security policy management process <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.3 Requirements management process <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.4 Information security risk assessment process <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 7.5 Information security risk treatment process <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7.6 Security implementation management process <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.7 Process to control outsourced services <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.8 Process to assure necessary awareness and competence <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.9 Information security incident management process <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.10 Information security change management process <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 7.11 Internal audit process <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 7.12 Performance evaluation process <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 7.13 Information security improvement process <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 8 Support processes 8.1 General 8.2 Records control process <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 8.3 Resource management process <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 8.4 Communication process <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 8.5 Information security customer relationship management process <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Annex A (informative) Statement of conformity to ISO\/IEC 33004 <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Guidance on information security management system processes<\/b><\/p>\n |