ISO ISO/IEC TR 27008 Information technology - Security techniques - Guidelines for auditors on information security controls - First Edition
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- SNV SN ISO/IEC 27002 Information technology - Security techniques - Code of practice for information security controls
- 35
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 13
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- BSI BS ISO/IEC 27040 Information technology — Security techniques — Storage security
- ISO ISO/IEC 27033-3 Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues - First Edition
- CEI UNI ISO/IEC 27002 Information technology - Security techniques - Code of practice for information security controls
- Картотека зарубежных и международных стандартов
International Organization for Standardization
Information technology - Security techniques - Guidelines for auditors on information security controls - First Edition
N ISO/IEC TR 27008
Annotation
This Technical Report provides guidance on reviewing the implementation and operation of controls, including technical compliance checking of information system controls, in compliance with an organization's established information security standards.
This Technical Report is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations conducting information security reviews and technical compliance checks. This Technical Report is not intended for management systems audits.
Автоматический перевод:
Информационные технологии - методы Безопасности - Инструкции для аудиторов на управлении защитой информации - Первый Выпуск
Этот Технический отчет дает представление о рассмотрении реализации и работы средств управления, включая техническую проверку соответствия средств управления информационной системой, в соответствии с установленными стандартами информационной безопасности организации.



