ISO/IEC 27000-series

The ISO/IEC 27000-series (also known as the 'ISMS Family of Standards' or 'ISO27k' for short) comprises information security standards published jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).[1]

The series provides best practice recommendations on information security management, risks and controls within the context of an overall information security management system (ISMS), similar in design to management systems for quality assurance (the ISO 9000 series) and environmental protection (the ISO 14000 series).

The series is deliberately broad in scope, covering more than just privacy, confidentiality and IT or technical security issues. It is applicable to organizations of all shapes and sizes. All organizations are encouraged to assess their information security risks, then implement appropriate information security controls according to their needs, using the guidance and suggestions where relevant. Given the dynamic nature of information security, the ISMS concept incorporates continuous feedback and improvement activities, summarized by Deming's "plan-do-check-act" approach, that seek to address changes in the threats, vulnerabilities or impacts of information security incidents.

The standards are the product of ISO/IEC JTC1 (Joint Technical Committee 1) SC27 (Subcommittee 27), an international body that meets in person twice a year.

The original ISO/IEC standards are sold directly by ISO, while sales outlets associated with various national standards bodies also sell various versions including local translations.

Early History

Many people, and many organisations, have contributed to the development of standards in the ISO27k series. The first standard in this series was ISO/IEC 17799:2000; this was a fast-tracking of the existing British standard BS 7799 part 1:1999[2] The initial release of BS 7799 was based, in part, on an information security policy manual developed by the Royal Dutch/Shell Group in the late 1980s and early 1990s. In 1993, the Department of Trade and Industry (United Kingdom) convened a team to review existing practice in information security, with the goal of producing a standards document. In 1995, the BSI Group published the first version of BS 7799.[3] One of the principal authors of BS 7999 recalls that, at the beginning of 1993, “The DTI decided to quickly assemble a group of industry representatives from seven different sectors: Shell ([David Lacey] and Les Riley), BOC Group (Neil Twist), BT (Dennis Willets), Marks & Spencer (Steve Jones), Midland Bank (Richard Hackworth), Nationwide (John Bowles) and Unilever (Rolf Moulton).”.[4] David Lacey credits Donn B. Parker as having the "original idea of establishing a set of information security controls", and with producing a document containing a "collection of around a hundred baseline controls" by the late 1980s for "the I-4 Information Security circle[5] which he conceived and founded."

Published standards

The published standards related to "information technology - security techniques" are:

In preparation

See also

References

  1. ISO Freely Available Standards - see ISO/IEC 27000:2014
  2. "ISO27k timeline". ISO27001security.com. IsecT Ltd. Retrieved 1 April 2016.
  3. Jake Kouns, Daniel Minoli (2011). Information Technology Risk Management in Enterprise Environments : a Review of Industry Practices and a Practical Guide to Risk Management Teams. Somerset: Wiley.
  4. "David Lacey on the Origins of ISO27k". Tripwire.com. 18 October 2013.
  5. https://i4online.com/
  6. http://standards.iso.org/ittf/PubliclyAvailableStandards/c041933_ISO_IEC_27000_2009.zip
  7. http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=42106
  8. http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=56742
  9. ISO/IEC 27014
  10. Mahncke, R. J. (2013). The Applicability of ISO/IEC27014:2013 For Use Within General Medical Practice.
  11. "ISO/IEC 27040". ISO Standards Catalogue. ISO. Retrieved 2014-06-15.

External links

This article is issued from Wikipedia - version of the Friday, April 01, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.