----------------------- | Search | Search results × | ISO/IEC 27001:2022(en) × |
Foreword |
Introduction |
1 ?Scope |
2 ?Normative references |
3 ?Terms and definitions |
4 ?Context of the organization |
4.1 ?Understanding the organization and its context |
4.2 ?Understanding the needs and expectations of interested parties |
4.3 ?Determining the scope of the information security management system |
4.4 ?Information security management system |
5 ?Leadership |
5.1 ?Leadership and commitment |
5.2 ?Policy |
5.3 ?Organizational roles, responsibilities and authorities |
6 ?Planning |
6.1 ?Actions to address risks and opportunities |
6.2 ?Information security objectives and planning to achieve them |
7 ?Support |
7.1 ?Resources |
7.2 ?Competence |
7.3 ?Awareness |
7.4 ?Communication |
7.5 ?Documented information |
8 ?Operation |
8.1 ?Operational planning and control |
8.2 ?Information security risk assessment |
8.3 ?Information security risk treatment |
| [1] | ISO/IEC 27002:2022, Information security, cybersecurity and privacy protection ? Information security controls |
| [2] | ISO/IEC 27003, Information technology ? Security techniques ? Information security management systems ? Guidance |
| [3] | ISO/IEC 27004, Information technology ? Security techniques ? Information security management ? Monitoring, measurement, analysis and evaluation |
| [4] | ISO/IEC 27005, Information security, cybersecurity and privacy protection ? Guidance on managing information security risks |
| [5] | ISO 31000:2018, Risk management ? Guidelines |