ISO/IEC 27014:2020 PDF

ISO/IEC 27014:2020 PDF

Name:
ISO/IEC 27014:2020 PDF

Published Date:
01/01/2020

Status:
Active

Description:

Information security, cybersecurity and privacy protection - Governance of information security

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$37.2
Need Help?

ISO/IEC 27014:2020 provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization.

The intended audience for this document is:

— governing body and top management;

— those who are responsible for evaluating, directing and monitoring an information security management system (ISMS) based on ISO/IEC 27001;

— those responsible for information security management that takes place outside the scope of an ISMS based on ISO/IEC 27001, but within the scope of governance.

This document is applicable to all types and sizes of organizations.

All references to an ISMS in this document apply to an ISMS based on ISO/IEC 27001.

This document focuses on the three types of ISMS organizations given in Annex B. However, this document can also be used by other types of organizations.


Edition : 2nd
File Size : 1 file , 1.5 MB
Note : This product is unavailable in Russia, Ukraine, Belarus
Number of Pages : 24
Published : 01/01/2020

History

ISO/IEC 27014:2020
Published Date: 01/01/2020
Information security, cybersecurity and privacy protection - Governance of information security
$37.2
ISO/IEC 27014:2013
Published Date: 05/15/2013
Information technology - Security techniques - Governance of information security
$20.4

Related products

ISO/IEC 15408-1:2022
Published Date: 07/31/2022
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model
$83.4
ISO/IEC 11770-2:2018
Published Date: 10/01/2018
IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
$58.2
ISO/IEC 9798-2:2019
Published Date: 06/01/2019
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
$37.2

Best-Selling Products

IETF 8254-2
Published Date: 07/01/2016
Papiers et cartons - Mesurage du brillant spéculaire - Partie 2: Brillant à 75° avec un faisceau parallèle, méthode DIN
$24.3
IETF FAA AC 43-10
Published Date: 02/01/1983
MECHANICAL WORK PERFORMED ON U.S. AND CANADIAN REGISTERED AIRCRAFT
IETF RFC 1000
Published Date: 08/01/1987
The Request for Comments Reference Guide
$21
IETF RFC 1002
Published Date: 03/01/1987
PROTOCOL STANDARD FOR A NetBIOS SERVICE ON A TCP/UDP TRANSPORT: DETAILED SPECIFICATIONS
$18.3
IETF RFC 1014
Published Date: 06/01/1987
XDR: EXTERNAL DATA REPRESENTATION STANDARD
IETF RFC 1042
Published Date: 02/01/1988
A Standard for the Transmission of IP Datagrams over IEEE 802 Networks
$10.2