{"id":361961,"date":"2024-10-20T01:38:28","date_gmt":"2024-10-20T01:38:28","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-270142020\/"},"modified":"2024-10-26T02:33:39","modified_gmt":"2024-10-26T02:33:39","slug":"bs-iso-iec-270142020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-270142020\/","title":{"rendered":"BS ISO\/IEC 27014:2020"},"content":{"rendered":"
This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization.<\/p>\n
The intended audience for this document is:<\/p>\n
governing body and top management;<\/p>\n<\/li>\n
those who are responsible for evaluating, directing and monitoring an information security management system (ISMS) based on ISO\/IEC 27001<\/span><\/span> ;<\/p>\n<\/li>\n those responsible for information security management that takes place outside the scope of an ISMS based on ISO\/IEC 27001<\/span><\/span> , but within the scope of governance.<\/p>\n<\/li>\n<\/ul>\n This document is applicable to all types and sizes of organizations.<\/p>\n All references to an ISMS in this document apply to an ISMS based on ISO\/IEC 27001<\/span><\/span>.<\/p>\n This document focuses on the three types of ISMS organizations given in Annex B<\/span>. However, this document can also be used by other types of organizations.<\/p>\n Information security, cybersecurity and privacy protection. Governance of information security<\/b><\/p>\nPDF Catalog<\/h4>\n
\n
\n PDF Pages<\/th>\n PDF Title<\/th>\n<\/tr>\n \n 2<\/td>\n National foreword <\/td>\n<\/tr>\n \n 6<\/td>\n Foreword <\/td>\n<\/tr>\n \n 7<\/td>\n Introduction <\/td>\n<\/tr>\n \n 9<\/td>\n 1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n\n 10<\/td>\n 4 Abbreviated terms
5 Use and structure of this document
6 Governance and management standards
6.1 Overview <\/td>\n<\/tr>\n\n 11<\/td>\n 6.2 Governance activities within the scope of an ISMS <\/td>\n<\/tr>\n \n 12<\/td>\n 6.3 Other related standards
6.4 Thread of governance within the organization
7 Entity governance and information security governance
7.1 Overview <\/td>\n<\/tr>\n\n 13<\/td>\n 7.2 Objectives
7.2.1 Objective 1: Establish integrated comprehensive entity-wide information security
7.2.2 Objective 2: Make decisions using a risk-based approach
7.2.3 Objective 3: Set the direction of acquisition
7.2.4 Objective 4: Ensure conformance with internal and external requirements <\/td>\n<\/tr>\n\n 14<\/td>\n 7.2.5 Objective 5: Foster a security-positive culture
7.2.6 Objective 6: Ensure the security performance meets current and future requirements of the entity
7.3 Processes
7.3.1 General <\/td>\n<\/tr>\n\n 15<\/td>\n 7.3.2 Evaluate <\/td>\n<\/tr>\n \n 16<\/td>\n 7.3.3 Direct
7.3.4 Monitor <\/td>\n<\/tr>\n\n 17<\/td>\n 7.3.5 Communicate
8 The governing body\u2019s requirements on the ISMS
8.1 Organization and ISMS <\/td>\n<\/tr>\n\n 18<\/td>\n 8.2 Scenarios (see Annex B) <\/td>\n<\/tr>\n \n 20<\/td>\n Annex A (informative) Governance relationship <\/td>\n<\/tr>\n \n 21<\/td>\n Annex B (informative) Types of ISMS organization <\/td>\n<\/tr>\n \n 23<\/td>\n Annex C (informative) Examples of communication <\/td>\n<\/tr>\n \n 24<\/td>\n Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" \n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n BSI<\/b><\/a><\/td>\n 2020<\/td>\n 24<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":361970,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[91,2641],"product_tag":[],"class_list":{"0":"post-361961","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-03-100-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/361961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/361970"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=361961"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=361961"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=361961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}