ISO 19011 PLUS REDLINE Guidelines for auditing management systems - Second Edition (STANDARD PLUS REDLINE)
Список продуктов
Данный раздел/документ содержится в продуктах:
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- 35
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- 35.040
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27003 Information technology - Security techniques - Information security management system implementation guidance - First Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- Картотека зарубежных и международных стандартов
Ссылается на
- В списке элементов: 21
- ISO ISO/IEC 27004 Information technology - Security techniques - Information security management - Monitoring, measurement, analysis and evaluation - Second EditionИнформационные технологии - методы безопасности - управление информационной безопасностью - Контроль, измерение, анализ и оценка - Второй Выпуск
Карточка документа - ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth EditionИнформационные технологии - методы Безопасности - системы управления Информационной безопасностью - Обзор и словарь - Четвертый Выпуск
Карточка документа - ISO ISO/IEC 27001 CORR 2 Information technology - Security techniques - Information security management systems - Requirements TECHNICAL CORRIGENDUM 2 - Second EditionИнформационные технологии - методы безопасности - системы управления Информационной безопасностью - требования TECHNICAL CORRIGENDUM 2 - Второй Выпуск
Карточка документа - ISO ISO/IEC 27002 CORR 2 Information technology - Security techniques - Code of practice for information security controls TECHNICAL CORRIGENDUM 2 - Second EditionИнформационные технологии - методы Безопасности - Свод правил для управления защитой информации ТЕХНИЧЕСКОЕ ИСПРАВЛЕНИЕ 2 - Второй Выпуск
Карточка документа - ISO 9000 Quality Management Systems - Fundamentals and Vocabulary - Fourth editionСистемы управления качеством - Основные принципы и Словарь - Четвертое издание
На основе ISO 9000 разработан ГОСТ Р ИСО 9000-2015 (IDT)ГОСТ Р ИСО 9000-2015 (IDT) - ISO 9001 Quality management systems — Requirements - Fifth editionСистемы управления качеством — Требования - Пятый выпуск
На основе ISO 9001 разработан ГОСТ Р ИСО 9001-2015 (IDT)ГОСТ Р ИСО 9001-2015 (IDT) - ISO 14001 Environmental management systems — Requirements with guidance for use - Third editionСистемы экологического управления — Требования с руководством использованием - Третий выпуск
На основе ISO 14001 разработан ГОСТ Р ИСО 14001-2016 (IDT)ГОСТ Р ИСО 14001-2016 (IDT) - ISO 39001 Road traffic safety (RTS) management systems - Requirements with guidance for use - First EditionСистемы управления безопасности дорожного движения (RTS) - Требования с руководством для использования - Первый Выпуск
На основе ISO 39001 разработан ГОСТ Р ИСО 39001-2014 (IDT)ГОСТ Р ИСО 39001-2014 (IDT) - ISO 19011 Guidelines for auditing management systems - Second EditionИнструкции для аудита систем управления - Второй Выпуск
На основе ISO 19011 разработан ГОСТ Р ИСО 19011-2012 (IDT)ГОСТ Р ИСО 19011-2012 (IDT) - ISO 30301 Information and documentation — Management systems for records — Requirements - First EditionИнформация и документация — Системы управления для записей — Требований - Первый Выпуск
На основе ISO 30301 разработан ГОСТ Р ИСО 30301-2014 (IDT)ГОСТ Р ИСО 30301-2014 (IDT) - ISO 50001 Energy management systems — Requirements with guidance for useСистемы энергетического менеджмента — Требования с руководством использованием
На основе ISO 50001 разработан ГОСТ Р ИСО 50001-2012 (IDT)ГОСТ Р ИСО 50001-2012 (IDT) - ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second EditionИнформационные технологии - методы Безопасности - управление рисками Информационной безопасности - Второй Выпуск
Карточка документа - ISO ISO/IEC 20000-1 Information technology - Service management - Part 1: Service management system requirements - Second EditionИнформационные технологии - управление службами - Часть 1: требования Системы управления службами - Второй Выпуск
Карточка документа - ISO ISO/IEC 17021 Conformity assessment - Requirements for bodies providing audit and certification of management systems - Second EditionОценка соответствия - Требования для тел, обеспечивающих аудит и сертификацию систем управления - Второй Выпуск
На основе ISO ISO/IEC 17021 разработан ГОСТ Р ИСО/МЭК 17021-2012 (IDT)ГОСТ Р ИСО/МЭК 17021-2012 (IDT) - ISO ISO/IEC 27003 Information technology - Security techniques - Information security management system implementation guidance - First EditionИнформационные технологии - методы Безопасности - руководство внедрения системы управления Информационной безопасностью - Первый Выпуск
На основе ISO ISO/IEC 27003 разработан ГОСТ Р ИСО/МЭК 27003-2012 (IDT)ГОСТ Р ИСО/МЭК 27003-2012 (IDT) - ISO 31000 Risk management - Principles and guidelines - First EditionУправление рисками - Принципы и инструкции - Первый Выпуск
На основе ISO 31000 разработан ГОСТ Р ИСО 31000-2010 (IDT)ГОСТ Р ИСО 31000-2010 (IDT) - ISO 14050 Environmental management — Vocabulary - Third EditionЭкологический контроль — Словарь - Третий Выпуск
На основе ISO 14050 разработан ГОСТ Р ИСО 14050-2009 (IDT)ГОСТ Р ИСО 14050-2009 (IDT) - ISO GUIDE 73 Risk management — Vocabulary - First EditionУправление рисками — Словарь - Первый Выпуск
На основе ISO GUIDE 73 разработан ГОСТ Р 51897-2011 (IDT)ГОСТ Р 51897-2011 (IDT) - ISO 28000 Specification for security management systems for the supply chain - First EditionСпецификация для систем управления безопасностью для системы поставок - Первый Выпуск
Карточка документа - ISO 22000 Food safety management systems Requirements for any organization in the food chain - First EditionТребования систем управления безопасности пищевых продуктов для любой организации в пищевой цепи - Первый Выпуск
На основе ISO 22000 разработан ГОСТ Р ИСО 22000-2007 (IDT)ГОСТ Р ИСО 22000-2007 (IDT) - ISO 2859-4 Sampling procedures for inspection by attributes Part 4: Procedures for assessment of declared quality levels - Deuxieme editionВыборка процедур для проверки Частью 4 признаков: Процедуры для оценки заявленных уровней качества - выпуск Deuxieme
На основе ISO 2859-4 разработан ГОСТ Р ИСО 2859-4-2006 (IDT)ГОСТ Р ИСО 2859-4-2006 (IDT)



