{"id":385551,"date":"2024-10-20T03:31:14","date_gmt":"2024-10-20T03:31:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-270132021\/"},"modified":"2024-10-26T06:23:40","modified_gmt":"2024-10-26T06:23:40","slug":"bs-iso-iec-270132021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-270132021\/","title":{"rendered":"BS ISO\/IEC 27013:2021"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Overview of ISO\/IEC 27001 and ISO\/IEC 20000-1 4.1 Understanding ISO\/IEC 27001 and ISO\/IEC 20000-1 <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4.2 ISO\/IEC 27001 concepts 4.3 ISO\/IEC 20000-1 concepts 4.4 Similarities and differences <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 Approaches for integrated implementation 5.1 General 5.2 Considerations of scope <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.3 Pre-implementation scenarios 5.3.1 General 5.3.2 Neither standard is currently used as the basis for a management system <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.3.3 The management system fulfils the requirements of one of the standards <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.3.4 Separate management systems exist which fulfil the requirements of each standard 6 Integrated implementation considerations 6.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.2 Potential challenges 6.2.1 Requirements and controls 6.2.2 Assets and configuration items <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.2.3 Service design and transition <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.2.4 Risk assessment and management <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.2.5 Risk and other parties 6.2.6 Incident management <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.2.7 Problem management <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.2.8 Gathering of evidence 6.2.9 Major incident management 6.2.10 Classification and escalation of incidents <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.2.11 Change management 6.3 Potential gains 6.3.1 Service level management and reporting 6.3.2 Management commitment and continual improvement <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.3.3 Capacity management 6.3.4 Management of third parties and related risk <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.3.5 Continuity and availability management 6.3.6 Release and deployment management <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex A (informative) Correspondence between ISO\/IEC 27001:2013, Clauses 1 to 10, and ISO\/IEC 20000-1:2018, Clauses 1 to 10 <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex B (informative) Correspondence between the controls in ISO\/IEC 27001:2013, Annex A, and the requirements in ISO\/IEC 20000-1:2018, Clauses 4 to 10 <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex C (informative) Comparison of terms and definitions between ISO\/IEC 27000:2018 and ISO\/IEC 20000-1:2018 <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Guidance on the integrated implementation of ISO\/IEC 27001 and ISO\/IEC 20000-1<\/b><\/p>\n |