ISO/IEC 27001

ISO/IEC 27001, part of the growing ISO/IEC 27000 series of standards, is an information security management system (ISMS) standard published in October 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Its full name is "ISO/IEC 27001:2005 - Information technology -- Security techniques -- Information security management systems -- Requirements" but it is commonly known as "ISO 27001".

It is intended to be used in conjunction with ISO/IEC 27002, the Code of Practice for Information Security Management, which lists security control objectives and recommends a range of specific security controls. Organizations that implement an ISMS in accordance with the best practice advice in ISO/IEC 27002 are likely to simultaneously meet the requirements of ISO/IEC 27001 but certification is entirely optional (unless mandated by the organization's stakeholders).

Certification

Organizations may be certified as compliant with ISO/IEC 27001 by a number of Accredited Registrars worldwide. Certification against any of the recognized national variants of ISO/IEC 27001 (e.g. JIS Q 27001, the Japanese version) by an accredited certification body is functionally equivalent to certification against ISO/IEC 27001 itself. Certification audits are usually conducted by ISO/IEC 27001 Lead Auditors.

In some countries, the bodies which verify conformity of management systems to specified standards are called "certification bodies", in others they are known as "registration bodies", "assessment and registration bodies", "certification/ registration bodies", and sometimes "registrars".

The ISO/IEC 27001 certification [ [http://www.27000.org/ismsprocess.htm The ISO/IEC 27001 Certification Process] .] , like other ISO management system certifications, usually involves a three-stage audit process:

* Stage 1 is a "table top" review of the existence and completeness of key documentation such as the organization's security policy, Statement of Applicability (SoA) and Risk Treatment Plan (RTP).

* Stage 2 is a detailed, in-depth audit involving testing the existence and effectiveness of the information security controls stated in the SoA and RTP, as well as their supporting documentation.

* Stage 3 is a follow-up reassessment audit to confirm that a previously-certified organization remains in compliance with the standard. Certification maintenance involves periodic reviews and re-assessments to confirm that the ISMS continues to operate as specified and intended.

References

ee also

* ISO 9001
* ISO/IEC_27000-series
* ISO/IEC 15408
* BS 7799
* Cyber security standards
* International Organization for Standardization
* List of ISO standards
* Standard of Good Practice published by the Information Security Forum

External links

* [http://www.standardsdirect.org/iso17799.htm ISO 27001 Source from BSI]
* [http://www.17799.com ISO 27001 and ISO 27002 User Group]
* [http://iso-17799.safemode.org ISO 17799 and ISO 27001 Wiki]


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • ISO/IEC 27001 — ISO/CEI 27001 Suite ISO/CEI 27000 ISO/CEI 27000 (en préparation) ISO/CEI 27001:2005 ISO/CEI 27002:2005 ISO/CEI 27003 (en préparation) ISO/CEI 27004 (en préparation) …   Wikipédia en Français

  • ISO/IEC 27001 — DIN ISO/IEC 27001 Bereich Informationstechnik Titel IT Sicherheitsverfahren – Informationssicherheits Managementsysteme – Anforderungen …   Deutsch Wikipedia

  • ISO/IEC 27001 — Este artículo o sección necesita referencias que aparezcan en una publicación acreditada, como revistas especializadas, monografías, prensa diaria o páginas de Internet fidedignas. Puedes añadirlas así o avisar …   Wikipedia Español

  • ISO/IEC 27001 — ISO 27001  международный стандарт по информационной безопасности разработанный совместно (ISO) и Международной Электротехнической Комиссии (IEC). Подготовлен к выпуску подкомитетом SC27 Обьединенного Технического Коммитета JTC 1. Стандарт… …   Википедия

  • ISO/IEC 27001:2005 — изд.1 Q JTC 1/SC 27 Информационная технология. Методы обеспечения безопасности. Системы менеджмента информационной безопасности. Требования раздел 35.040 …   Стандарты Международной организации по стандартизации (ИСО)

  • ДСТУ ISO/IEC 27001:2010 — Інформаційні технології. Методи та засоби досягнення інформаційної безпеки. Системи керування інформаційною безпекою. Вимоги (ISOIEC 27001:2005, IDT) [br] НД чинний: від 2012 07 01 Зміни: Технічний комітет: Мова: Метод прийняття: Переклад… …   Покажчик національних стандартів

  • Iso/cei 27001 — Suite ISO/CEI 27000 ISO/CEI 27000 (en préparation) ISO/CEI 27001:2005 ISO/CEI 27002:2005 ISO/CEI 27003 (en préparation) ISO/CEI 27004 (en préparation) …   Wikipédia en Français

  • ISO/CEI 27001 — Suite ISO/CEI 27000 ISO/CEI 27000:2009 ISO/CEI 27001:2005 ISO/CEI 27002:2005 ISO/CEI 27003:2010 ISO/CEI 27004:2009 ISO/CEI 27005:2011 …   Wikipédia en Français

  • ISO/IEC 27002 — part of a growing family of ISO/IEC ISMS standards, the ISO/IEC 27000 series is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) as… …   Wikipedia

  • ISO/IEC 27000 — part of a growing family of ISO/IEC ISMS standards, the ISO/IEC 27000 series is the number reserved for a new international standard, which currently has the provisional title: Information technology Security techniques Information security… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”