PRICES include / exclude VAT
Homepage>BS Standards>03 SOCIOLOGY. SERVICES. COMPANY ORGANIZATION AND MANAGEMENT. ADMINISTRATION. TRANSPORT>03.100 Company organization and management>03.100.70 Management systems>PD ISO/IEC TS 27008:2019 Information technology. Security techniques. Guidelines for the assessment of information security controls
Sponsored link
immediate downloadReleased: 2019-01-24
PD ISO/IEC TS 27008:2019 Information technology. Security techniques. Guidelines for the assessment of information security controls

PD ISO/IEC TS 27008:2019

Information technology. Security techniques. Guidelines for the assessment of information security controls

Format
Availability
Price and currency
English Secure PDF
Immediate download
376.80 EUR
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
37.68 EUR
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
113.04 EUR
English Hardcopy
In stock
376.80 EUR
Standard number:PD ISO/IEC TS 27008:2019
Pages:108
Released:2019-01-24
ISBN:978 0 580 94767 4
Status:Standard
DESCRIPTION

PD ISO/IEC TS 27008:2019


This standard PD ISO/IEC TS 27008:2019 Information technology. Security techniques. Guidelines for the assessment of information security controls is classified in these ICS categories:
  • 03.100.70 Management systems
  • 35.030 IT Security

This document provides guidance on reviewing and assessing the implementation and operation of information security controls, including the technical assessment of information system controls, in compliance with an organization's established information security requirements including technical compliance against assessment criteria based on the information security requirements established by the organization.

This document offers guidance on how to review and assess information security controls being managed through an Information Security Management System specified by ISO/IEC 27001.

It is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations conducting information security reviews and technical compliance checks.