loading
CSA ISO/IEC 27031 - Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity
January 1, 2013 - CSA

This International Standard describes the concepts and principles of information and communication technology (ICT) readiness for business continuity, and provides a framework of methods and processes to identify and specify all aspects (such as performance criteria, design, and...

DS/ISO/IEC 27031 - Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity
March 28, 2011 - DS

ISO/IEC 27031:2010 describes the concepts and principles of information and comunication technology (ICT) readiness for business continuity, and provides a framework of methods and processes to identify and specify all aspects (such as performance criteria, design, and implementation)...

ISO/IEC 27031 - Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity
March 1, 2011 - ISO

This International Standard describes the concepts and principles of information and communication technology (ICT) readiness for business continuity, and provides a framework of methods and processes to identify and specify all aspects (such as performance criteria, design, and...

KIT 214 - Business Continuity Management Best Practice Kit. Standards and Books
October 13, 2010 - BSI
A description is not available for this item.
CSA ISO/IEC 27036-4 - Information technology - Security techniques - Information security for supplier relationships - Part 4: Guidelines for security of cloud services
January 1, 2018 - CSA

This document provides cloud service customers and cloud service providers with guidance on a) gaining visibility into the information security risks associated with the use of cloud services and managing those risks effectively, and b) responding to risks specific to the acquisition or provision...

DS/ISO/IEC 27036-4 - Information technology – Security techniques – Information security for supplier relationships – Part 4: Guidelines for security of cloud services
October 7, 2016 - DS

ISO/IEC 27036-4:2016 provides cloud service customers and cloud service providers with guidance on a) gaining visibility into the information security risks associated with the use of cloud services and managing those risks effectively, and b) responding to risks specific to the acquisition or...

ISO/IEC 27036-4 - Information technology - Security techniques - Information security for supplier relationships - Part 4: Guidelines for security of cloud services
October 1, 2016 - ISO

This document provides cloud service customers and cloud service providers with guidance on a) gaining visibility into the information security risks associated with the use of cloud services and managing those risks effectively, and b) responding to risks specific to the acquisition or provision...

DS/ISO/IEC 27036-3 - Information technology – Security techniques – Information security for supplier relationships – Guidelines for information and communication technology supply chain security
January 27, 2014 - DS

ISO/IEC 27036-3:2013 provides product and service acquirers and suppliers in the information and communication technology (ICT) supply chain with guidance on: gaining visibility into and managing the information security risks caused by physically dispersed and multi-layered ICT supply chains;...

ISO/IEC 27036-3 - Information technology - Security techniques - Information security for supplier relationships - Part 3: Guidelines for information and communication technology supply chain security
November 15, 2013 - ISO

This part of ISO/IEC 27036 provides product and service acquirers and suppliers in ICT supply chain with guidance on: a) gaining visibility into and managing the information security risks caused by physically dispersed and multi-layered ICT supply chains; b) responding to risks stemming from the...

CSA ISO/IEC 16350 - Information technology - Systems and software engineering - Application management
January 1, 2016 - CSA

General This International Standard establishes a common framework for application management processes with well-defined terminology that can be referenced by the software industry. It contains processes, activities, and tasks that apply during the stage of operation and use from the point of view...

ISO/IEC 16350 - Information technology - Systems and software engineering - Application management
August 1, 2015 - ISO

General This International Standard establishes a common framework for application management processes with well-defined terminology that can be referenced by the software industry. It contains processes, activities, and tasks that apply during the stage of operation and use from the point of view...

DS/ISO/IEC 24762 - Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services
April 22, 2008 - DS

1.1 General This International Standard describes the basic practices which ICT DR service providers, both in-house and outsourced, should consider. It covers the requirements that service providers should meet, recognizing that individual organizations may have additional requirements that are...

ISO/IEC 24762 - Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services
February 1, 2008 - ISO

General This International Standard describes the basic practices which ICT DR service providers, both in-house and outsourced, should consider. It covers the requirements that service providers should meet, recognizing that individual organizations may have additional requirements that are...

CSA ISO/IEC 24762 - Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services
January 1, 2008 - CSA

General This International Standard describes the basic practices which ICT DR service providers, both in-house and outsourced, should consider. It covers the requirements that service providers should meet, recognizing that individual organizations may have additional requirements that are...

Advertisement