The ISO/IEC 27001:2005 is a standard for:

The ISO/IEC 27001:2005 is a standard for:

The ISO/IEC 27001:2005 is a standard for:

A.
Information Security Management System

B.
Implementation and certification of basic security measures

C.
Evaluation criteria for the validation of cryptographic algorithms

D.
Certification of public key infrastructures

Explanation:
The ISO 27000 Directory at: http://www.27000.org/index.htm has great coverage of the ISO 27000 series. The
text below was extracted from their website.
As mention by Belinda the ISO 27001 standard is the certification controls criteria while ISO 27002 is the actual
standard. ISO 27002 used to be called ISO 17799 before being renamed.
The ISO 27001 standard was published in October 2005, essentially replacing the old BS7799-2 standard. It is
the specification for an ISMS, an Information Security Management System. BS7799 itself was a long standing
standard, first published in the nineties as a code of practice. As this matured, a second part emerged to cover
management systems. It is this against which certification is granted. Today in excess of a thousand certificates
are in place, across the world.
ISO 27001 enhanced the content of BS7799-2 and harmonized it with other standards. A scheme has been
introduced by various certification bodies for conversion from BS7799 certification to ISO27001 certification.
The objective of the standard itself is to “provide a model for establishing, implementing, operating, monitoring,
reviewing, maintaining, and improving an Information Security Management System”. Regarding its adoption,
this should be a strategic decision. Further, “The design and implementation of an organization’s ISMS is
influenced by their needs and objectives, security requirements, the process employed and the size and
structure of the organization”.
The standard defines its ‘process approach’ as “The application of a system of processes within an
organization, together with the identification and interactions of these processes, and their management”. It
employs the PDCA, Plan-Do-Act model to structure the processes, and reflects the principles set out in the
OECG guidelines (see oecd.org).
THE CONTENTS OF ISO 27001
The content sections of the standard are:
Context Of The Organization
Information Security Leadership
Planning An ISMS
Support
Operation
Performance Evaluation
Improvement
Annex A – List of controls and their objectives
The ISO 27002 standard is the rename of the ISO 17799 standard, and is a code of practice for information
security. It basically outlines hundreds of potential controls and control mechanisms, which may be
implemented, in theory, subject to the guidance provided within ISO 27001.
The standard “established guidelines and general principles for initiating, implementing, maintaining, and
improving information security management within an organization”. The actual controls listed in the standard
are intended to address the specific requirements identified via a formal risk assessment. The standard is also
intended to provide a guide for the development of “organizational security standards and effective security
management practices and to help build confidence in inter-organizational activities”.The basis of the standard was originally a document published by the UK government, which became a
standard ‘proper’ in 1995, when it was re-published by BSI as BS7799. In 2000 it was again re-published, this
time by ISO, as ISO 17799. A new version of this appeared in 2005, along with a new publication, ISO 27001.
These two documents are intended to be used together, with one complimenting the other.
ISO’s future plans for this standard are focused largely around the development and publication of industry
specific versions (for example: health sector, manufacturing, and so on). Note that this is a lengthy process, so
the new standards will take some time to appear
THE CONTENTS OF ISO 17799 / 27002
The content sections are:
Structure
Risk Assessment and Treatment
Security Policy
Organization of Information Security
Asset Management
Human Resources Security
Physical Security
Communications and Ops Management
Access Control
Information Systems Acquisition, Development, Maintenance
Information Security Incident management
Business Continuity
Compliance

http://www.iso.org/iso/catalogue_detail?csnumber=42103
http://www.27000.org/index.htm



Leave a Reply 0

Your email address will not be published. Required fields are marked *