General information. Basic information to identify the product. Method or tool name: ISO/IEC Management of information and communications. ISO/IEC INTERNATIONAL. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management of information and communications.
|Published (Last):||25 April 2006|
|PDF File Size:||13.44 Mb|
|ePub File Size:||19.22 Mb|
|Price:||Free* [*Free Regsitration Required]|
ISO/IEC — ENISA
Compliance to IT standards There is a compliance with a national or international standard. The text is a direct resource for the implementation of security management. Lifecycle Date of the first edition, date and number of actual version. Used in EU member states: Regulatory compliance Irc is a given compliance 133355 the product with international regulations.
Level of reference of the product Details about the type of initiator of the product. Languages List the available languages that the tool supports. Method or tool name: Date of first release: Tools supporting the method List of tools that support the product.
Trial before purchase Details regarding the evaluation period if any before purchase of the product. Many Used in non-EU member states: License and certification scheme Specify the licensing and certification schemes available for this method.
The standard is a commonly used code of practice, and serves as a resource for the implementation of security management practices and as a yardstick for auditing such practices. We also use analytics.
The current version as of January Consultancy support Specify the kind of support available.
General information Basic information to identify the product. The standard can be implemented in any sector confronted by technology security management.
ISO/IEC Standard 13335
To opt-out from analytics, click for more information.
ISO/IEC Standard — ENISA
Geographical spread Information concerning the spread of this tool. Method provides interfaces to other organisational processes: Flexible knowledge databases It is possible to adapt a knowledge database specific to the activity domain of the company.
Management of information and communications technology security – Part2: Concepts and models for information and communications technology security management. This standard is currently under development; completion is expected for Information security risk management.
A new version is currently under development and expected to be finished in However, the standard is not free of charge, and its provisions are not publicly available. ISO Country of origin: Concepts and models for information and communications technology security management Source reference: Organisation processes integration The method provides interfaces to existing processes within the organisation.
Method phases supported Risk identification: Not publicly available ISO standard, which can be voluntarily implemented. No Existing certification scheme: Identification Specify the phases this method supports and a short iao.
Skills needed Specify the level of skills needed to use and maintain the solution. For this reason, specific provisions cannot be quoted.