ISO/IEC 27001 Ersetzt / Remplace / Replaces: Ausgabe / Edition: SN ISO/IEC 2700

ISO/IEC 27001 Ersetzt / Remplace / Replaces: Ausgabe / Edition: SN ISO/IEC 27001:2005 2013-11 ICS Code: 35.040 Information technology - Security techniques - Information security management systems - Requirements In der vorliegenden Schweizer Norm ist die ISO/IEC 27001:2013 identisch abgedruckt. Dans la présente Norme Suisse le ISO/IEC 27001:2013 est reproduit identiquement. In this Swiss standard ISO/IEC 27001:2013 is reprinted identically. Für diese Norm ist das Normen-Komitee INB/NK 149 << Informationstechnologie >> des interdisziplinären Normenbereichs zuständig. La présente norme est de la compétence du comité de normalisation INB/NK 149 << Technologie de l'information >> du secteur interdisciplinaire de normalisation. The standardization committee INB/NK 149 << Information technology >> of the interdisciplinary sector is in charge of the present standard. 0012 SNV Ref Nr. / No. de réf / No ref.: Herausgeber / Editeur / Editor Vertrieb / Distribution © SNV Anzahl Seiten / Nombre de pages / Number of pages: SNV Schweizerische Normen-Vereinigung Bürglistrasse 29 CH-8400 Winterthur SNV Schweizerische Normen-Vereinigung Bürglistrasse 29 CH-8400 Winterthur SN ISO/IEC 27001:2013 en Preisklasse / Classe de prix / Price class: Gültig ab / Valide de / Valid from: 2013-11-01 23 – Leerseite / Page blanche – Information technology — Security techniques — Information security management systems — Requirements Technologies de l’information — Techniques de sécurité — Systèmes de management de la sécurité de l’information — Exigences © ISO/IEC 2013 INTERNATIONAL STANDARD ISO/IEC 27001 Second edition 2013-10-01 Reference number ISO/IEC 27001:2013(E) ISO/IEC 27001:2013(E) ii © ISO/IEC 2013 – All rights reserved COPYRIGHT PROTECTED DOCUMENT © ISO/IEC 2013 ŽŽ”‹‰Š–•”‡•‡”˜‡†ǤŽ‡••‘–Ї”™‹•‡•’‡ ‹ϐ‹‡†ǡ‘’ƒ”–‘ˆ–Š‹•’—„Ž‹ ƒ–‹‘ƒ›„‡”‡’”‘†— ‡†‘”—–‹Ž‹œ‡†‘–Ї”™‹•‡‹ƒ›ˆ‘” ‘”„›ƒ›‡ƒ•ǡ‡Ž‡ –”‘‹ ‘”‡ Šƒ‹ ƒŽǡ‹ Ž—†‹‰’Š‘–‘ ‘’›‹‰ǡ‘”’‘•–‹‰‘–Ї‹–‡”‡–‘”ƒ‹–”ƒ‡–ǡ™‹–Š‘—–’”‹‘” ™”‹––‡’‡”‹••‹‘Ǥ‡”‹••‹‘ ƒ„‡”‡“—‡•–‡†ˆ”‘‡‹–Ї” ƒ––Їƒ††”‡••„‡Ž‘™‘” ǯ•‡„‡”„‘†›‹–Ї ‘—–”›‘ˆ –Ї”‡“—‡•–‡”Ǥ  ‘’›”‹‰Š–‘ˆϐ‹ ‡ ƒ•‡’‘•–ƒŽ‡ͷ͸Ȉ Ǧͳʹͳͳ ‡‡˜ƒʹͲ Tel. + 41 22 749 01 11 ƒšΪͶͳʹʹ͹ͶͻͲͻͶ͹ Ǧƒ‹Ž ‘’›”‹‰Š–̷‹•‘Ǥ‘”‰ Web www.iso.org —„Ž‹•Ї†‹™‹–œ‡”Žƒ† ISO/IEC 27001:2013(E) © ISO/IEC 2013 – All rights reserved iii Contents ƒ‰‡ Foreword ........................................................................................................................................................................................................................................iv 0 Introduction ...............................................................................................................................................................................................................v 1 Scope .................................................................................................................................................................................................................................1 2 Normative references ......................................................................................................................................................................................1 ͵ ‡”•ƒ††‡ϐ‹‹–‹‘• .....................................................................................................................................................................................1 4 Context of the organization .......................................................................................................................................................................1 ͶǤͳ †‡”•–ƒ†‹‰–Ї‘”‰ƒ‹œƒ–‹‘ƒ†‹–• ‘–‡š– .......................................................................................................1 ͶǤʹ †‡”•–ƒ†‹‰–Ї‡‡†•ƒ†‡š’‡ –ƒ–‹‘•‘ˆ‹–‡”‡•–‡†’ƒ”–‹‡• ..............................................................1 ͶǤ͵ ‡–‡”‹‹‰–Ї• ‘’‡‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ ..........................................1 ͶǤͶ ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ ..................................................................................................................... 2 5 Leadership ..................................................................................................................................................................................................................2 ͷǤͳ ‡ƒ†‡”•Š‹’ƒ† ‘‹–‡– ..................................................................................................................................................... 2 ͷǤʹ ‘Ž‹ › ............................................................................................................................................................................................................... 2 ͷǤ͵ ”‰ƒ‹œƒ–‹‘ƒŽ”‘އ•ǡ”‡•’‘•‹„‹Ž‹–‹‡•ƒ†ƒ—–Š‘”‹–‹‡•.......................................................................................... 3 6 Planning .........................................................................................................................................................................................................................3 ͸Ǥͳ  –‹‘•–‘ƒ††”‡••”‹••ƒ†‘’’‘”–—‹–‹‡• ................................................................................................................... 3 ͸Ǥʹ ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡•ƒ†’Žƒ‹‰–‘ƒ Š‹‡˜‡–Ї ...................................................................ͷ 7 Support ...........................................................................................................................................................................................................................5 7.1 Resources ..................................................................................................................................................................................................... ͷ 7.2 Competence ............................................................................................................................................................................................... ͷ ͹Ǥ͵ ™ƒ”‡‡•• ................................................................................................................................................................................................... ͷ ͹ǤͶ ‘—‹ ƒ–‹‘ ...................................................................................................................................................................................... ͸ ͹Ǥͷ ‘ —‡–‡†‹ˆ‘”ƒ–‹‘ ............................................................................................................................................................... ͸ 8 Operation .....................................................................................................................................................................................................................7 ͺǤͳ ’‡”ƒ–‹‘ƒŽ’Žƒ‹‰ƒ† ‘–”‘Ž .......................................................................................................................................... 7 ͺǤʹ ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•ƒ••‡••‡–................................................................................................................................. 7 ͺǤ͵ ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•–”‡ƒ–‡– .................................................................................................................................... 7 9 Performance evaluation ...............................................................................................................................................................................7 ͻǤͳ ‘‹–‘”‹‰ǡ‡ƒ•—”‡‡–ǡƒƒŽ›•‹•ƒ†‡˜ƒŽ—ƒ–‹‘ ............................................................................................... 7 ͻǤʹ –‡”ƒŽƒ—†‹– ............................................................................................................................................................................................ 8 ͻǤ͵ ƒƒ‰‡‡–”‡˜‹‡™ ........................................................................................................................................................................... 8 10 Improvement ............................................................................................................................................................................................................9 ͳͲǤͳ ‘ ‘ˆ‘”‹–›ƒ† ‘””‡ –‹˜‡ƒ –‹‘ ................................................................................................................................. 9 ͳͲǤʹ ‘–‹—ƒŽ‹’”‘˜‡‡– .................................................................................................................................................................. 9 Annex A ȋ‘”ƒ–‹˜‡Ȍ Reference control objectives and controls ........................................................................................10 Bibliography .............................................................................................................................................................................................................................23 ISO/IEC 27001:2013(E) Foreword ȋ–Ї –‡”ƒ–‹‘ƒŽ”‰ƒ‹œƒ–‹‘ˆ‘”–ƒ†ƒ”†‹œƒ–‹‘Ȍƒ† ȋ–Ї –‡”ƒ–‹‘ƒŽއ –”‘–‡ А‹ ƒŽ ‘‹••‹‘Ȍ ˆ‘” –Ї •’‡ ‹ƒŽ‹œ‡† •›•–‡ ˆ‘” ™‘”ކ™‹†‡ •–ƒ†ƒ”†‹œƒ–‹‘Ǥ ƒ–‹‘ƒŽ „‘†‹‡• –Šƒ– ƒ”‡ ‡„‡”•‘ˆ ‘” ’ƒ”–‹ ‹’ƒ–‡‹–Ї†‡˜‡Ž‘’‡–‘ˆ –‡”ƒ–‹‘ƒŽ–ƒ†ƒ”†•–Š”‘—‰Š–‡ А‹ ƒŽ ‘‹––‡‡• ‡•–ƒ„Ž‹•Ї† „› –Ї ”‡•’‡ –‹˜‡ ‘”‰ƒ‹œƒ–‹‘ –‘ †‡ƒŽ ™‹–Š ’ƒ”–‹ —Žƒ” ϐ‹‡Ž†• ‘ˆ –‡ А‹ ƒŽ ƒ –‹˜‹–›Ǥ ƒ† –‡ А‹ ƒŽ ‘‹––‡‡• ‘ŽŽƒ„‘”ƒ–‡‹ϐ‹‡Ž†•‘ˆ—–—ƒŽ‹–‡”‡•–Ǥ–Ї”‹–‡”ƒ–‹‘ƒŽ ‘”‰ƒ‹œƒ–‹‘•ǡ‰‘˜‡”‡–ƒŽƒ†‘Ǧ‰‘˜‡”‡–ƒŽǡ‹Ž‹ƒ‹•‘™‹–Š ƒ† ǡƒŽ•‘–ƒ‡’ƒ”–‹–Ї ™‘”Ǥ –Їϐ‹‡Ž†‘ˆ‹ˆ‘”ƒ–‹‘–‡ А‘Ž‘‰›ǡ ƒ† Šƒ˜‡‡•–ƒ„Ž‹•Ї†ƒŒ‘‹––‡ А‹ ƒŽ ‘‹––‡‡ǡ ISO/IEC JTC 1. –‡”ƒ–‹‘ƒŽ–ƒ†ƒ”†•ƒ”‡†”ƒˆ–‡†‹ƒ ‘”†ƒ ‡™‹–Š–Ї”—އ•‰‹˜‡‹–Ї Ȁ ‹”‡ –‹˜‡•ǡƒ”–ʹǤ Їƒ‹–ƒ•‘ˆ–ЇŒ‘‹––‡ А‹ ƒŽ ‘‹––‡‡‹•–‘’”‡’ƒ”‡ –‡”ƒ–‹‘ƒŽ–ƒ†ƒ”†•Ǥ”ƒˆ– –‡”ƒ–‹‘ƒŽ –ƒ†ƒ”†• ƒ†‘’–‡† „› –Ї Œ‘‹– –‡ А‹ ƒŽ ‘‹––‡‡ ƒ”‡ ‹” —Žƒ–‡† –‘ ƒ–‹‘ƒŽ „‘†‹‡• ˆ‘” ˜‘–‹‰Ǥ —„Ž‹ ƒ–‹‘ ƒ• ƒ –‡”ƒ–‹‘ƒŽ –ƒ†ƒ”† ”‡“—‹”‡• ƒ’’”‘˜ƒŽ „› ƒ– އƒ•– ͹ͷ Ψ ‘ˆ –Ї ƒ–‹‘ƒŽ „‘†‹‡• ƒ•–‹‰ƒ˜‘–‡Ǥ ––‡–‹‘‹•†”ƒ™–‘–Ї’‘••‹„‹Ž‹–›–Šƒ–•‘‡‘ˆ–Ї‡Ž‡‡–•‘ˆ–Š‹•†‘ —‡–ƒ›„‡–Ї•—„Œ‡ –‘ˆ ’ƒ–‡–”‹‰Š–•Ǥ ƒ† •ŠƒŽŽ‘–„‡Їކ”‡•’‘•‹„އˆ‘”‹†‡–‹ˆ›‹‰ƒ›‘”ƒŽŽ•— Š’ƒ–‡–”‹‰Š–•Ǥ Ȁ  ʹ͹ͲͲͳ ™ƒ• ’”‡’ƒ”‡† „› ‘‹– ‡ А‹ ƒŽ ‘‹––‡‡ Ȁ   ͳǡ Information technologyǡ —„ ‘‹––‡‡ʹ͹ǡIT Security techniques. Š‹• •‡ ‘† ‡†‹–‹‘ ƒ ‡Ž• ƒ† ”‡’Žƒ ‡• –Ї ϐ‹”•– ‡†‹–‹‘ ȋ Ȁ  ʹ͹ͲͲͳǣʹͲͲͷȌǡ ™Š‹ Š Šƒ• „‡‡ –‡ А‹ ƒŽŽ›”‡˜‹•‡†Ǥ iv © ISO/IEC 2013 – All rights reserved ISO/IEC 27001:2013(E) 0 Introduction 0.1 General Š‹• –‡”ƒ–‹‘ƒŽ–ƒ†ƒ”†Šƒ•„‡‡’”‡’ƒ”‡†–‘’”‘˜‹†‡”‡“—‹”‡‡–•ˆ‘”‡•–ƒ„Ž‹•Š‹‰ǡ‹’އ‡–‹‰ǡ ƒ‹–ƒ‹‹‰ƒ† ‘–‹—ƒŽŽ›‹’”‘˜‹‰ƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ǤЇƒ†‘’–‹‘‘ˆƒ ‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡‹•ƒ•–”ƒ–‡‰‹ †‡ ‹•‹‘ˆ‘”ƒ‘”‰ƒ‹œƒ–‹‘ǤЇ‡•–ƒ„Ž‹•Š‡– ƒ†‹’އ‡–ƒ–‹‘‘ˆƒ‘”‰ƒ‹œƒ–‹‘ǯ•‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡‹•‹ϐŽ—‡ ‡†„›–Ї ‘”‰ƒ‹œƒ–‹‘ǯ•‡‡†•ƒ†‘„Œ‡ –‹˜‡•ǡ•‡ —”‹–›”‡“—‹”‡‡–•ǡ–Ї‘”‰ƒ‹œƒ–‹‘ƒŽ’”‘ ‡••‡•—•‡†ƒ†–Ї •‹œ‡ƒ†•–”— –—”‡‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘ǤŽŽ‘ˆ–Ї•‡‹ϐŽ—‡ ‹‰ˆƒ –‘”•ƒ”‡‡š’‡ –‡†–‘ Šƒ‰‡‘˜‡”–‹‡Ǥ Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡’”‡•‡”˜‡•–Ї ‘ϐ‹†‡–‹ƒŽ‹–›ǡ‹–‡‰”‹–›ƒ†ƒ˜ƒ‹Žƒ„‹Ž‹–› ‘ˆ‹ˆ‘”ƒ–‹‘„›ƒ’’Ž›‹‰ƒ”‹•ƒƒ‰‡‡–’”‘ ‡••ƒ†‰‹˜‡• ‘ϐ‹†‡ ‡–‘‹–‡”‡•–‡†’ƒ”–‹‡•–Šƒ– ”‹••ƒ”‡ƒ†‡“—ƒ–‡Ž›ƒƒ‰‡†Ǥ –‹•‹’‘”–ƒ––Šƒ––Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡‹•’ƒ”–‘ˆƒ†‹–‡‰”ƒ–‡†™‹–Š–Ї ‘”‰ƒ‹œƒ–‹‘ǯ•’”‘ ‡••‡•ƒ†‘˜‡”ƒŽŽƒƒ‰‡‡–•–”— –—”‡ƒ†–Šƒ–‹ˆ‘”ƒ–‹‘•‡ —”‹–›‹• ‘•‹†‡”‡† ‹–Ї†‡•‹‰‘ˆ’”‘ ‡••‡•ǡ‹ˆ‘”ƒ–‹‘•›•–‡•ǡƒ† ‘–”‘Ž•Ǥ –‹•‡š’‡ –‡†–Šƒ–ƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–› ƒƒ‰‡‡–•›•–‡‹’އ‡–ƒ–‹‘™‹ŽŽ„‡• ƒŽ‡†‹ƒ ‘”†ƒ ‡™‹–Š–Ї‡‡†•‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘Ǥ Š‹• –‡”ƒ–‹‘ƒŽ–ƒ†ƒ”† ƒ„‡—•‡†„›‹–‡”ƒŽƒ†‡š–‡”ƒŽ’ƒ”–‹‡•–‘ƒ••‡••–Ї‘”‰ƒ‹œƒ–‹‘ǯ• ƒ„‹Ž‹–›–‘‡‡––Ї‘”‰ƒ‹œƒ–‹‘ǯ•‘™‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‡“—‹”‡‡–•Ǥ Ї‘”†‡”‹™Š‹ Š”‡“—‹”‡‡–•ƒ”‡’”‡•‡–‡†‹–Š‹• –‡”ƒ–‹‘ƒŽ–ƒ†ƒ”††‘‡•‘–”‡ϐއ ––Ї‹” ‹’‘”–ƒ ‡‘”‹’Ž›–Ї‘”†‡”‹™Š‹ Š–Ї›ƒ”‡–‘„‡‹’އ‡–‡†ǤЇŽ‹•–‹–‡•ƒ”‡‡—‡”ƒ–‡†ˆ‘” ”‡ˆ‡”‡ ‡’—”’‘•‡‘Ž›Ǥ Ȁ  ʹ͹ͲͲͲ †‡• ”‹„‡• –Ї ‘˜‡”˜‹‡™ ƒ† –Ї ˜‘ ƒ„—Žƒ”› ‘ˆ ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡•ǡ ”‡ˆ‡”‡ ‹‰ –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡ ˆƒ‹Ž› ‘ˆ •–ƒ†ƒ”†• ȋ‹ Ž—†‹‰ ISO/IEC 27003[2]ǡ Ȁ ʹ͹ͲͲͶ[3]ƒ† Ȁ ʹ͹ͲͲͷ[4]Ȍǡ™‹–Š”‡Žƒ–‡†–‡”•ƒ††‡ϐ‹‹–‹‘•Ǥ 0.2 Compatibility with other management system standards Š‹• –‡”ƒ–‹‘ƒŽ–ƒ†ƒ”†ƒ’’Ž‹‡•–ЇŠ‹‰ŠǦއ˜‡Ž•–”— –—”‡ǡ‹†‡–‹ ƒŽ•—„Ǧ Žƒ—•‡–‹–އ•ǡ‹†‡–‹ ƒŽ–‡š–ǡ ‘‘–‡”•ǡƒ† ‘”‡†‡ϐ‹‹–‹‘•†‡ϐ‹‡†‹‡š‘ˆ Ȁ ‹”‡ –‹˜‡•ǡƒ”–ͳǡ‘•‘Ž‹†ƒ–‡†  —’’އ‡–ǡƒ†–Ї”‡ˆ‘”‡ƒ‹–ƒ‹• ‘’ƒ–‹„‹Ž‹–›™‹–Š‘–Ї”ƒƒ‰‡‡–•›•–‡•–ƒ†ƒ”†•–Šƒ–Šƒ˜‡ ƒ†‘’–‡†–Ї‡šǤ Š‹• ‘‘ƒ’’”‘ƒ І‡ϐ‹‡†‹–Ї‡š™‹ŽŽ„‡—•‡ˆ—Žˆ‘”–Š‘•‡‘”‰ƒ‹œƒ–‹‘•–Šƒ– Š‘‘•‡–‘‘’‡”ƒ–‡ ƒ•‹‰Ž‡ƒƒ‰‡‡–•›•–‡–Šƒ–‡‡–•–Ї”‡“—‹”‡‡–•‘ˆ–™‘‘”‘”‡ƒƒ‰‡‡–•›•–‡•–ƒ†ƒ”†•Ǥ © ISO/IEC 2013 – All rights reserved v Information technology — Security techniques — Information security management systems — Requirements 1 Scope Š‹• –‡”ƒ–‹‘ƒŽ –ƒ†ƒ”† •’‡ ‹ϐ‹‡• –Ї ”‡“—‹”‡‡–• ˆ‘” ‡•–ƒ„Ž‹•Š‹‰ǡ ‹’އ‡–‹‰ǡ ƒ‹–ƒ‹‹‰ ƒ† ‘–‹—ƒŽŽ› ‹’”‘˜‹‰ ƒ ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡ ™‹–Š‹ –Ї ‘–‡š– ‘ˆ –Ї ‘”‰ƒ‹œƒ–‹‘ǤŠ‹• –‡”ƒ–‹‘ƒŽ–ƒ†ƒ”†ƒŽ•‘‹ Ž—†‡•”‡“—‹”‡‡–•ˆ‘”–Їƒ••‡••‡–ƒ†–”‡ƒ–‡– ‘ˆ‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹••–ƒ‹Ž‘”‡†–‘–Ї‡‡†•‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘ǤЇ”‡“—‹”‡‡–••‡–‘—–‹–Š‹• –‡”ƒ–‹‘ƒŽ–ƒ†ƒ”†ƒ”‡‰‡‡”‹ ƒ†ƒ”‡‹–‡†‡†–‘„‡ƒ’’Ž‹ ƒ„އ–‘ƒŽŽ‘”‰ƒ‹œƒ–‹‘•ǡ”‡‰ƒ”†Ž‡•• ‘ˆ–›’‡ǡ•‹œ‡‘”ƒ–—”‡Ǥš Ž—†‹‰ƒ›‘ˆ–Ї”‡“—‹”‡‡–••’‡ ‹ϐ‹‡†‹Žƒ—•‡•Ͷ to 10‹•‘–ƒ ‡’–ƒ„އ ™Š‡ƒ‘”‰ƒ‹œƒ–‹‘ Žƒ‹• ‘ˆ‘”‹–›–‘–Š‹• –‡”ƒ–‹‘ƒŽ–ƒ†ƒ”†Ǥ 2 Normative references Їˆ‘ŽŽ‘™‹‰†‘ —‡–•ǡ‹™Š‘އ‘”‹’ƒ”–ǡƒ”‡‘”ƒ–‹˜‡Ž›”‡ˆ‡”‡ ‡†‹–Š‹•†‘ —‡–ƒ†ƒ”‡ ‹†‹•’‡•ƒ„އ ˆ‘” ‹–• ƒ’’Ž‹ ƒ–‹‘Ǥ ‘” †ƒ–‡† ”‡ˆ‡”‡ ‡•ǡ ‘Ž› –Ї ‡†‹–‹‘ ‹–‡† ƒ’’Ž‹‡•Ǥ ‘” —†ƒ–‡† ”‡ˆ‡”‡ ‡•ǡ–ЇŽƒ–‡•–‡†‹–‹‘‘ˆ–Ї”‡ˆ‡”‡ ‡††‘ —‡–ȋ‹ Ž—†‹‰ƒ›ƒ‡†‡–•Ȍƒ’’Ž‹‡•Ǥ Ȁ  ʹ͹ͲͲͲǡ Information technology — Security techniques — Information security management systems — Overview and vocabulary ͵ ‡”•ƒ††‡ϐ‹‹–‹‘• ‘”–Ї’—”’‘•‡•‘ˆ–Š‹•†‘ —‡–ǡ–Ї–‡”•ƒ††‡ϐ‹‹–‹‘•‰‹˜‡‹ Ȁ ʹ͹ͲͲͲƒ’’Ž›Ǥ 4 Context of the organization 4.1 Understanding the organization and its context Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‡–‡”‹‡‡š–‡”ƒŽƒ†‹–‡”ƒŽ‹••—‡•–Šƒ–ƒ”‡”‡Ž‡˜ƒ––‘‹–•’—”’‘•‡ƒ†–Šƒ– ƒˆˆ‡ –‹–•ƒ„‹Ž‹–›–‘ƒ Š‹‡˜‡–Ї‹–‡†‡†‘—– ‘‡ȋ•Ȍ‘ˆ‹–•‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǥ  ‡–‡”‹‹‰–Ї•‡‹••—‡•”‡ˆ‡”•–‘‡•–ƒ„Ž‹•Š‹‰–Ї‡š–‡”ƒŽƒ†‹–‡”ƒŽ ‘–‡š–‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘ ‘•‹†‡”‡†‹Žƒ—•‡ͷǤ͵‘ˆ ͵ͳͲͲͲǣʹͲͲͻ[ͷ]. 4.2 Understanding the needs and expectations of interested parties Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‡–‡”‹‡ǣ ƒȌ ‹–‡”‡•–‡†’ƒ”–‹‡•–Šƒ–ƒ”‡”‡Ž‡˜ƒ––‘–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǣƒ† „Ȍ –Ї”‡“—‹”‡‡–•‘ˆ–Ї•‡‹–‡”‡•–‡†’ƒ”–‹‡•”‡Ž‡˜ƒ––‘‹ˆ‘”ƒ–‹‘•‡ —”‹–›Ǥ  Ї ”‡“—‹”‡‡–• ‘ˆ ‹–‡”‡•–‡† ’ƒ”–‹‡• ƒ› ‹ Ž—†‡ އ‰ƒŽ ƒ† ”‡‰—Žƒ–‘”› ”‡“—‹”‡‡–• ƒ† ‘–”ƒ –—ƒŽ‘„Ž‹‰ƒ–‹‘•Ǥ 4.3 Determining the scope of the information security management system Ї ‘”‰ƒ‹œƒ–‹‘ •ŠƒŽŽ †‡–‡”‹‡ –Ї „‘—†ƒ”‹‡• ƒ† ƒ’’Ž‹ ƒ„‹Ž‹–› ‘ˆ –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡–•›•–‡–‘‡•–ƒ„Ž‹•Š‹–•• ‘’‡Ǥ INTERNATIONAL STANDARD ISO/IEC 27001:2013(E) © ISO/IEC 2013 – All rights reserved 1 ISO/IEC 27001:2013(E) Ї†‡–‡”‹‹‰–Š‹•• ‘’‡ǡ–Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ ‘•‹†‡”ǣ ƒȌ –Ї‡š–‡”ƒŽƒ†‹–‡”ƒŽ‹••—‡•”‡ˆ‡””‡†–‘‹4.1Ǣ „Ȍ –Ї”‡“—‹”‡‡–•”‡ˆ‡””‡†–‘‹4.2Ǣƒ† Ȍ ‹–‡”ˆƒ ‡•ƒ††‡’‡†‡ ‹‡•„‡–™‡‡ƒ –‹˜‹–‹‡•’‡”ˆ‘”‡†„›–Ї‘”‰ƒ‹œƒ–‹‘ǡƒ†–Š‘•‡–Šƒ–ƒ”‡ ’‡”ˆ‘”‡†„›‘–Ї”‘”‰ƒ‹œƒ–‹‘•Ǥ Ї• ‘’‡•ŠƒŽŽ„‡ƒ˜ƒ‹Žƒ„އƒ•†‘ —‡–‡†‹ˆ‘”ƒ–‹‘Ǥ 4.4 Information security management system Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ‡•–ƒ„Ž‹•Šǡ‹’އ‡–ǡƒ‹–ƒ‹ƒ† ‘–‹—ƒŽŽ›‹’”‘˜‡ƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–› ƒƒ‰‡‡–•›•–‡ǡ‹ƒ ‘”†ƒ ‡™‹–Š–Ї”‡“—‹”‡‡–•‘ˆ–Š‹• –‡”ƒ–‹‘ƒŽ–ƒ†ƒ”†Ǥ 5 Leadership 5.1 Leadership and commitment ‘’ ƒƒ‰‡‡– •ŠƒŽŽ †‡‘•–”ƒ–‡ އƒ†‡”•Š‹’ ƒ† ‘‹–‡– ™‹–Š ”‡•’‡ – –‘ –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–›ƒƒ‰‡‡–•›•–‡„›ǣ ƒȌ ‡•—”‹‰–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›ƒ†–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡•ƒ”‡‡•–ƒ„Ž‹•Ї† ƒ†ƒ”‡ ‘’ƒ–‹„އ™‹–Š–Ї•–”ƒ–‡‰‹ †‹”‡ –‹‘‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘Ǣ „Ȍ ‡•—”‹‰–Ї‹–‡‰”ƒ–‹‘‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡”‡“—‹”‡‡–•‹–‘–Ї ‘”‰ƒ‹œƒ–‹‘ǯ•’”‘ ‡••‡•Ǣ Ȍ ‡•—”‹‰–Šƒ––Ї”‡•‘—” ‡•‡‡†‡†ˆ‘”–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ƒ”‡ƒ˜ƒ‹Žƒ„އǢ †Ȍ ‘—‹ ƒ–‹‰–Ї‹’‘”–ƒ ‡‘ˆ‡ˆˆ‡ –‹˜‡‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–ƒ†‘ˆ ‘ˆ‘”‹‰–‘ –Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡”‡“—‹”‡‡–•Ǣ ‡Ȍ ‡•—”‹‰–Šƒ––Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ƒ Š‹‡˜‡•‹–•‹–‡†‡†‘—– ‘‡ȋ•ȌǢ ˆȌ †‹”‡ –‹‰ƒ†•—’’‘”–‹‰’‡”•‘•–‘ ‘–”‹„—–‡–‘–Ї‡ˆˆ‡ –‹˜‡‡••‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–› ƒƒ‰‡‡–•›•–‡Ǣ ‰Ȍ ’”‘‘–‹‰ ‘–‹—ƒŽ‹’”‘˜‡‡–Ǣƒ† ŠȌ •—’’‘”–‹‰‘–Ї””‡Ž‡˜ƒ–ƒƒ‰‡‡–”‘އ•–‘†‡‘•–”ƒ–‡–Ї‹”އƒ†‡”•Š‹’ƒ•‹–ƒ’’Ž‹‡•–‘–Ї‹” ƒ”‡ƒ•‘ˆ”‡•’‘•‹„‹Ž‹–›Ǥ 5.2 Policy ‘’ƒƒ‰‡‡–•ŠƒŽŽ‡•–ƒ„Ž‹•Šƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›–Šƒ–ǣ ƒȌ ‹•ƒ’’”‘’”‹ƒ–‡–‘–Ї’—”’‘•‡‘ˆ–Ї‘”‰ƒ‹œƒ–‹‘Ǣ „Ȍ ‹ Ž—†‡•‹ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡•ȋ•‡‡͸ǤʹȌ‘”’”‘˜‹†‡•–Їˆ”ƒ‡™‘”ˆ‘”•‡––‹‰‹ˆ‘”ƒ–‹‘ •‡ —”‹–›‘„Œ‡ –‹˜‡•Ǣ Ȍ ‹ Ž—†‡•ƒ ‘‹–‡––‘•ƒ–‹•ˆ›ƒ’’Ž‹ ƒ„އ”‡“—‹”‡‡–•”‡Žƒ–‡†–‘‹ˆ‘”ƒ–‹‘•‡ —”‹–›Ǣƒ† †Ȍ ‹ Ž—†‡•ƒ ‘‹–‡––‘ ‘–‹—ƒŽ‹’”‘˜‡‡–‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǥ Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›•ŠƒŽŽǣ ‡Ȍ „‡ƒ˜ƒ‹Žƒ„އƒ•†‘ —‡–‡†‹ˆ‘”ƒ–‹‘Ǣ 2 © ISO/IEC 2013 – All rights reserved ISO/IEC 27001:2013(E) ˆȌ „‡ ‘—‹ ƒ–‡†™‹–Š‹–Ї‘”‰ƒ‹œƒ–‹‘Ǣƒ† ‰Ȍ „‡ƒ˜ƒ‹Žƒ„އ–‘‹–‡”‡•–‡†’ƒ”–‹‡•ǡƒ•ƒ’’”‘’”‹ƒ–‡Ǥ 5.3 Organizational roles, responsibilities and authorities ‘’ƒƒ‰‡‡–•ŠƒŽŽ‡•—”‡–Šƒ––Ї”‡•’‘•‹„‹Ž‹–‹‡•ƒ†ƒ—–Š‘”‹–‹‡•ˆ‘””‘އ•”‡Ž‡˜ƒ––‘‹ˆ‘”ƒ–‹‘ •‡ —”‹–›ƒ”‡ƒ••‹‰‡†ƒ† ‘—‹ ƒ–‡†Ǥ ‘’ƒƒ‰‡‡–•ŠƒŽŽƒ••‹‰–Ї”‡•’‘•‹„‹Ž‹–›ƒ†ƒ—–Š‘”‹–›ˆ‘”ǣ ƒȌ ‡•—”‹‰–Šƒ––Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ ‘ˆ‘”•–‘–Ї”‡“—‹”‡‡–•‘ˆ–Š‹• –‡”ƒ–‹‘ƒŽ–ƒ†ƒ”†Ǣƒ† „Ȍ ”‡’‘”–‹‰‘–Ї’‡”ˆ‘”ƒ ‡‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡–‘–‘’ƒƒ‰‡‡–Ǥ  ‘’ƒƒ‰‡‡–ƒ›ƒŽ•‘ƒ••‹‰”‡•’‘•‹„‹Ž‹–‹‡•ƒ†ƒ—–Š‘”‹–‹‡•ˆ‘””‡’‘”–‹‰’‡”ˆ‘”ƒ ‡‘ˆ–Ї ‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡™‹–Š‹–Ї‘”‰ƒ‹œƒ–‹‘Ǥ 6 Planning 6.1 Actions to address risks and opportunities 6.1.1 General Ї’Žƒ‹‰ˆ‘”–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ǡ–Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ ‘•‹†‡”–Ї issues referred to in 4.1ƒ†–Ї”‡“—‹”‡‡–•”‡ˆ‡””‡†–‘‹4.2ƒ††‡–‡”‹‡–Ї”‹••ƒ†‘’’‘”–—‹–‹‡• –Šƒ–‡‡†–‘„‡ƒ††”‡••‡†–‘ǣ ƒȌ ‡•—”‡–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡ ƒƒ Š‹‡˜‡‹–•‹–‡†‡†‘—– ‘‡ȋ•ȌǢ „Ȍ ’”‡˜‡–ǡ‘””‡†— ‡ǡ—†‡•‹”‡†‡ˆˆ‡ –•Ǣƒ† Ȍ ƒ Š‹‡˜‡ ‘–‹—ƒŽ‹’”‘˜‡‡–Ǥ Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ’Žƒǣ †Ȍ ƒ –‹‘•–‘ƒ††”‡••–Ї•‡”‹••ƒ†‘’’‘”–—‹–‹‡•Ǣƒ† e) how to ͳȌ ‹–‡‰”ƒ–‡ ƒ† ‹’އ‡– –Ї ƒ –‹‘• ‹–‘ ‹–• ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ƒƒ‰‡‡– •›•–‡ ’”‘ ‡••‡•Ǣƒ† ʹȌ ‡˜ƒŽ—ƒ–‡–Ї‡ˆˆ‡ –‹˜‡‡••‘ˆ–Ї•‡ƒ –‹‘•Ǥ 6.1.2 Information security risk assessment Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‡ϐ‹‡ƒ†ƒ’’Ž›ƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•ƒ••‡••‡–’”‘ ‡••–Šƒ–ǣ ƒȌ ‡•–ƒ„Ž‹•Ї•ƒ†ƒ‹–ƒ‹•‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹• ”‹–‡”‹ƒ–Šƒ–‹ Ž—†‡ǣ ͳȌ –Ї”‹•ƒ ‡’–ƒ ‡ ”‹–‡”‹ƒǢƒ† ʹȌ ”‹–‡”‹ƒˆ‘”’‡”ˆ‘”‹‰‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•ƒ••‡••‡–•Ǣ „Ȍ ‡•—”‡• –Šƒ– ”‡’‡ƒ–‡† ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ”‹• ƒ••‡••‡–• ’”‘†— ‡ ‘•‹•–‡–ǡ ˜ƒŽ‹† ƒ† ‘’ƒ”ƒ„އ”‡•—Ž–•Ǣ © ISO/IEC 2013 – All rights reserved 3 ISO/IEC 27001:2013(E) Ȍ ‹†‡–‹ϐ‹‡•–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹••ǣ ͳȌ ƒ’’Ž›–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•ƒ••‡••‡–’”‘ ‡••–‘‹†‡–‹ˆ›”‹••ƒ••‘ ‹ƒ–‡†™‹–Š–ЇŽ‘•• ‘ˆ ‘ϐ‹†‡–‹ƒŽ‹–›ǡ‹–‡‰”‹–›ƒ†ƒ˜ƒ‹Žƒ„‹Ž‹–›ˆ‘”‹ˆ‘”ƒ–‹‘™‹–Š‹–Ї• ‘’‡‘ˆ–Ї‹ˆ‘”ƒ–‹‘ •‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǣƒ† ʹȌ ‹†‡–‹ˆ›–Ї”‹•‘™‡”•Ǣ †Ȍ ƒƒŽ›•‡•–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹••ǣ ͳȌ ƒ••‡••–Ї’‘–‡–‹ƒŽ ‘•‡“—‡ ‡•–Šƒ–™‘—ކ”‡•—Ž–‹ˆ–Ї”‹••‹†‡–‹ϐ‹‡†‹͸ǤͳǤʹ c) 1) were –‘ƒ–‡”‹ƒŽ‹œ‡Ǣ ʹȌ ƒ••‡••–Ї”‡ƒŽ‹•–‹ Ž‹‡Ž‹Š‘‘†‘ˆ–Ї‘ —””‡ ‡‘ˆ–Ї”‹••‹†‡–‹ϐ‹‡†‹͸ǤͳǤʹ ȌͳȌǢƒ† ͵Ȍ †‡–‡”‹‡–Їއ˜‡Ž•‘ˆ”‹•Ǣ ‡Ȍ ‡˜ƒŽ—ƒ–‡•–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹••ǣ ͳȌ ‘’ƒ”‡–Ї”‡•—Ž–•‘ˆ”‹•ƒƒŽ›•‹•™‹–Š–Ї”‹• ”‹–‡”‹ƒ‡•–ƒ„Ž‹•Ї†‹͸ǤͳǤʹƒȌǢƒ† ʹȌ ’”‹‘”‹–‹œ‡–ЇƒƒŽ›•‡†”‹••ˆ‘””‹•–”‡ƒ–‡–Ǥ Ї ‘”‰ƒ‹œƒ–‹‘ •ŠƒŽŽ ”‡–ƒ‹ †‘ —‡–‡† ‹ˆ‘”ƒ–‹‘ ƒ„‘—– –Ї ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ”‹• ƒ••‡••‡–’”‘ ‡••Ǥ 6.1.3 Information security risk treatment Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‡ϐ‹‡ƒ†ƒ’’Ž›ƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•–”‡ƒ–‡–’”‘ ‡••–‘ǣ ƒȌ •‡Ž‡ – ƒ’’”‘’”‹ƒ–‡ ‹ˆ‘”ƒ–‹‘ •‡ —”‹–› ”‹• –”‡ƒ–‡– ‘’–‹‘•ǡ –ƒ‹‰ ƒ ‘—– ‘ˆ –Ї ”‹• ƒ••‡••‡–”‡•—Ž–•Ǣ „Ȍ †‡–‡”‹‡ƒŽŽ ‘–”‘Ž•–Šƒ–ƒ”‡‡ ‡••ƒ”›–‘‹’އ‡––Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•–”‡ƒ–‡– ‘’–‹‘ȋ•Ȍ Š‘•‡Ǣ  ”‰ƒ‹œƒ–‹‘• ƒ†‡•‹‰ ‘–”‘Ž•ƒ•”‡“—‹”‡†ǡ‘”‹†‡–‹ˆ›–Їˆ”‘ƒ›•‘—” ‡Ǥ Ȍ ‘’ƒ”‡–Ї ‘–”‘Ž•†‡–‡”‹‡†‹͸ǤͳǤ͵„Ȍƒ„‘˜‡™‹–Š–Š‘•‡‹‡šƒ†˜‡”‹ˆ›–Šƒ–‘‡ ‡••ƒ”› ‘–”‘Ž•Šƒ˜‡„‡‡‘‹––‡†Ǣ NOTE 1 ‡š ‘–ƒ‹•ƒ ‘’”‡Š‡•‹˜‡Ž‹•–‘ˆ ‘–”‘Ž‘„Œ‡ –‹˜‡•ƒ† ‘–”‘Ž•Ǥ•‡”•‘ˆ–Š‹• –‡”ƒ–‹‘ƒŽ –ƒ†ƒ”†ƒ”‡†‹”‡ –‡†–‘‡š–‘‡•—”‡–Šƒ–‘‡ ‡••ƒ”› ‘–”‘Ž•ƒ”‡‘˜‡”Ž‘‘‡†Ǥ ʹ ‘–”‘Ž ‘„Œ‡ –‹˜‡• ƒ”‡ ‹’Ž‹ ‹–Ž› ‹ Ž—†‡† ‹ –Ї ‘–”‘Ž• Š‘•‡Ǥ Ї ‘–”‘Ž ‘„Œ‡ –‹˜‡• ƒ† controls listed in ‡šƒ”‡‘–‡šŠƒ—•–‹˜‡ƒ†ƒ††‹–‹‘ƒŽ ‘–”‘Ž‘„Œ‡ –‹˜‡•ƒ† ‘–”‘Ž•ƒ›„‡‡‡†‡†Ǥ †Ȍ ’”‘†— ‡ƒ–ƒ–‡‡–‘ˆ’’Ž‹ ƒ„‹Ž‹–›–Šƒ– ‘–ƒ‹•–Ї‡ ‡••ƒ”› ‘–”‘Ž•ȋ•‡‡͸ǤͳǤ͵„Ȍƒ† ȌȌƒ† Œ—•–‹ϐ‹ ƒ–‹‘ˆ‘”‹ Ž—•‹‘•ǡ™Š‡–Ї”–Ї›ƒ”‡‹’އ‡–‡†‘”‘–ǡƒ†–ЇŒ—•–‹ϐ‹ ƒ–‹‘ˆ‘”‡š Ž—•‹‘• of controls from ‡šǢ ‡Ȍ ˆ‘”—Žƒ–‡ƒ‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•–”‡ƒ–‡–’ŽƒǢƒ† ˆȌ ‘„–ƒ‹”‹•‘™‡”•ǯƒ’’”‘˜ƒŽ‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•–”‡ƒ–‡–’Žƒƒ†ƒ ‡’–ƒ ‡‘ˆ–Ї ”‡•‹†—ƒŽ‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹••Ǥ Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ”‡–ƒ‹†‘ —‡–‡†‹ˆ‘”ƒ–‹‘ƒ„‘—––Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•–”‡ƒ–‡– process.  Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‹•ƒ••‡••‡–ƒ†–”‡ƒ–‡–’”‘ ‡••‹–Š‹• –‡”ƒ–‹‘ƒŽ–ƒ†ƒ”†ƒŽ‹‰• ™‹–Š–Ї’”‹ ‹’އ•ƒ†‰‡‡”‹ ‰—‹†‡Ž‹‡•’”‘˜‹†‡†‹ ͵ͳͲͲͲ[ͷ]. 4 © ISO/IEC 2013 – All rights reserved ISO/IEC 27001:2013(E) 6.2 Information security objectives and planning to achieve them Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ‡•–ƒ„Ž‹•Š‹ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡•ƒ–”‡Ž‡˜ƒ–ˆ— –‹‘•ƒ†އ˜‡Ž•Ǥ Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡••ŠƒŽŽǣ ƒȌ „‡ ‘•‹•–‡–™‹–Š–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›’‘Ž‹ ›Ǣ „Ȍ „‡‡ƒ•—”ƒ„އȋ‹ˆ’”ƒ –‹ ƒ„އȌǢ Ȍ –ƒ‡‹–‘ƒ ‘—–ƒ’’Ž‹ ƒ„އ‹ˆ‘”ƒ–‹‘•‡ —”‹–›”‡“—‹”‡‡–•ǡƒ†”‡•—Ž–•ˆ”‘”‹•ƒ••‡••‡– ƒ†”‹•–”‡ƒ–‡–Ǣ †Ȍ „‡ ‘—‹ ƒ–‡†Ǣƒ† ‡Ȍ „‡—’†ƒ–‡†ƒ•ƒ’’”‘’”‹ƒ–‡Ǥ Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ”‡–ƒ‹†‘ —‡–‡†‹ˆ‘”ƒ–‹‘‘–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡•Ǥ Ї’Žƒ‹‰Š‘™–‘ƒ Š‹‡˜‡‹–•‹ˆ‘”ƒ–‹‘•‡ —”‹–›‘„Œ‡ –‹˜‡•ǡ–Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‡–‡”‹‡ǣ ˆȌ ™Šƒ–™‹ŽŽ„‡†‘‡Ǣ ‰Ȍ ™Šƒ–”‡•‘—” ‡•™‹ŽŽ„‡”‡“—‹”‡†Ǣ ŠȌ ™Š‘™‹ŽŽ„‡”‡•’‘•‹„އǢ ‹Ȍ ™Š‡‹–™‹ŽŽ„‡ ‘’އ–‡†Ǣƒ† ŒȌ Š‘™–Ї”‡•—Ž–•™‹ŽŽ„‡‡˜ƒŽ—ƒ–‡†Ǥ 7 Support 7.1 Resources Ї‘”‰ƒ‹œƒ–‹‘•ŠƒŽŽ†‡–‡”‹‡ƒ†’”‘˜‹†‡–Ї”‡•‘—” ‡•‡‡†‡†ˆ‘”–Ї‡•–ƒ„Ž‹•Š‡–ǡ‹’އ‡–ƒ–‹‘ǡ ƒ‹–‡ƒ ‡ƒ† ‘–‹—ƒŽ‹’”‘˜‡‡–‘ˆ–Ї‹ˆ‘”ƒ–‹‘•‡ —”‹–›ƒƒ‰‡‡–•›•–‡Ǥ 7.2 uploads/Management/ 1-norma-iso27001-2013.pdf

  • 41
  • 0
  • 0
Afficher les détails des licences
Licence et utilisation
Gratuit pour un usage personnel Attribution requise
Partager
  • Détails
  • Publié le Sep 21, 2021
  • Catégorie Management
  • Langue French
  • Taille du fichier 0.4146MB