{"id":439520,"date":"2024-10-20T08:09:33","date_gmt":"2024-10-20T08:09:33","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-270012023-tc\/"},"modified":"2024-10-26T15:16:52","modified_gmt":"2024-10-26T15:16:52","slug":"bs-en-iso-iec-270012023-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-270012023-tc\/","title":{"rendered":"BS EN ISO\/IEC 27001:2023 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | compares BS EN ISO\/IEC 27001:2023 Incorporating corrigendum July 2023 <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | TRACKED CHANGES Text example 1 \u2014 indicates added text (in green) <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 1 \u200bScope 2 \u200bNormative references 3 \u200bTerms and definitions 4 \u200bContext of the organization 4.1 \u200bUnderstanding the organization and its context 4.2 \u200bUnderstanding the needs and expectations of interested parties <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 4.3 \u200bDetermining the scope of the information security management system 4.4 \u200bInformation security management system 5 \u200bLeadership 5.1 \u200bLeadership and commitment <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 5.2 \u200bPolicy 5.3 \u200bOrganizational roles, responsibilities and authorities 6 \u200bPlanning 6.1 \u200bActions to address risks and opportunities 6.1.1 \u200bGeneral <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 6.1.2 \u200bInformation security risk assessment 6.1.3 \u200bInformation security risk treatment <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 6.2 \u200bInformation security objectives and planning to achieve them <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 7 \u200bSupport 7.1 \u200bResources 7.2 \u200bCompetence 7.3 \u200bAwareness 7.4 \u200bCommunication 7.5 \u200bDocumented information 7.5.1 \u200bGeneral <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 7.5.2 \u200bCreating and updating 7.5.3 \u200bControl of documented information 8 \u200bOperation 8.1 \u200bOperational planning and control <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 8.2 \u200bInformation security risk assessment 8.3 \u200bInformation security risk treatment 9 \u200bPerformance evaluation 9.1 \u200bMonitoring, measurement, analysis and evaluation 9.2 \u200bInternal audit 9.2.1 General <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 9.2.2 Internal audit programme 9.3 \u200bManagement review 9.3.1 General 9.3.2 Management review inputs 9.3.3 Management review results <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 10 \u200bImprovement 10.1 \u200bContinual improvement 10.2 \u200bNonconformity and corrective action <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | Annex A (normative) Information security controls reference <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Information security, cybersecurity and privacy protection. Information security management systems. Requirements<\/b><\/p>\n |