General information. Basic information to identify the product. Method or tool name: ISO/IEC Management of information and communications. ISO/IEC INTERNATIONAL. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management of information and communications.
|Published (Last):||20 January 2008|
|PDF File Size:||20.38 Mb|
|ePub File Size:||11.3 Mb|
|Price:||Free* [*Free Regsitration Required]|
ISO Country of origin: The text is a direct resource for the implementation of security management. Maturity level of the Information 13335 The product gives a means of measurement for the maturity of the information system security.
Skills needed Specify the level of skills needed to use and maintain the solution. A new version is currently under development and expected to be finished in However, the standard is not free of charge, and its provisions are not publicly available.
Method or tool name: To opt-out from analytics, click for more information. No Existing certification scheme: To opt-out from analytics, click for more information. Method phases supported Risk identification: Technical integration of available tools Particular supporting tools see C-7 can be integrated with other tools.
Many Used in non-EU member states: Information security risk management.
ISO/IEC Standard — ENISA
Languages List the available languages that the tool supports. I’ve read it More information.
The standard is a commonly used code of practice, and serves as a resource for the implementation of security management practices and as a yardstick for auditing such practices. Consultancy support Specify the kind of support available.
ISO/IEC Standard 13335
I’ve read it More information. Not publicly available ISO standard, which can be voluntarily implemented. The current version as of January The standard can be implemented in any sector confronted by technology security management.
Method provides interfaces to other organisational processes: Identification Specify the phases this method supports and a 1335 description.
Organisation processes integration The method provides interfaces to existing processes within the organisation. Regulatory compliance There is a given compliance of the product with international regulations. The annexes contain examples of information security Risk Assessment approaches as well as lists of possible threats, vulnerabilities and security controls.
International organisation based in Switzerland. Concepts and models for information and communications technology security management.
ISO/IEC — ENISA
Compliance to IT standards There is a compliance with a national or international standard. Standard containing generally accepted descriptions of concepts and models for information and communications technology security management. Used in EU member states: Date of first release: Level of reference of the product Details about the type of initiator of the product.
International organisation based in Switzerland Level of reference of the product Details about the type of initiator of the product International Standardization body: Trial before purchase Details regarding the evaluation period if any before purchase of the product.
This standard is currently under development; completion is expected for We also use analytics. Flexible knowledge databases It is possible to adapt a knowledge database specific to the activity domain of the company. Concepts and models for information and communications technology security management Source reference: The standard is not free of charge, and its provisions are not publicly available. Geographical spread Information concerning the spread of this tool.
We also use analytics. Lifecycle Date of the first edition, date and number of actual version. License and certification scheme Specify the licensing and certification schemes available for this method. General information Basic information to identify the product.