BS ISO/IEC 27009:2020
$142.49
Information security, cybersecurity and privacy protection. Sector-specific application of ISO/IEC 27001. Requirements
Published By | Publication Date | Number of Pages |
BSI | 2020 | 26 |
If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]
This document specifies the requirements for creating sector-specific standards that extend ISO/IEC 27001, and complement or amend ISO/IEC 27002 to support a specific sector (domain, application area or market).
This document explains how to:
-
include requirements in addition to those in ISO/IEC 27001 ,
-
refine or interpret any of the ISO/IEC 27001 requirements,
-
include controls in addition to those of ISO/IEC 27001:2013, Annex A and ISO/IEC 27002 ,
-
modify any of the controls of ISO/IEC 27001:2013, Annex A and ISO/IEC 27002 ,
-
add guidance to or modify the guidance of ISO/IEC 27002 .
This document specifies that additional or refined requirements do not invalidate the requirements in ISO/IEC 27001.
This document is applicable to those involved in producing sector-specific standards.
Status | Under Review |
---|---|
Pages | 26 |
Publication Date | 2020-04-27 |
ISBN | 978 0 539 01264 4 |
Standard Number | BS ISO/IEC 27009:2020 |
Title | Information security, cybersecurity and privacy protection. Sector-specific application of ISO/IEC 27001. Requirements |
Identical National Standard Of | ISO/IEC 27009 |
Replaces | BS ISO/IEC 27009:2016 |
Descriptors | Documents, Management, Classification systems, Data security, Information exchange, Anti-burglar measures, Information systems, Data processing, Computer technology, Data storage protection, Computers, Maintenance, Computer networks, Technical documents, Records (documents) |
Publisher | BSI |
Committee | IST/33/1 |
ICS Codes | 03.100.70 - Management systems |
Related products
-
BS ISO/IEC 27001:2022 ExComm:2023 Edition
Expert Commentary for BS ISO/IEC 27001:2022. Information security, cybersecurity and privacy protection. Information security management…
-
BS ISO/IEC 27005:2022
Information security, cybersecurity and privacy protection. Guidance on managing information security risks Published By Publication…
-
BSI 23/30437366 DC 2023
BS ISO/IEC 27006-2. Requirements for bodies providing audit and certification of information security management systems…
-
BS EN ISO/IEC 27005:2024
Information security, cybersecurity and privacy protection. Guidance on managing information security risks Published By Publication…
-
BS ISO/IEC 27007:2020 – TC
Tracked Changes. Information security, cybersecurity and privacy protection. Guidelines for information security management systems auditing…
-
BS EN ISO/IEC 27002:2022
Information security, cybersecurity and privacy protection. Information security controls Published By Publication Date Number of…
-
BSI 23/30470501 DC:2023 Edition
BS EN ISO/IEC 27006-1.2. Information technology, cybersecurity and privacy protection. Requirements for bodies providing audit…
-
BSI 21/30423472 DC:2021 Edition
BS ISO/IEC 20009-3. Information security. Anonymous entity authentication – Part 3. Mechanisms based on blind…
-
BS ISO/IEC 27004:2009 2010
Information technology. Security techniques. Information security management. Measurement Published By Publication Date Number of Pages…
-
BSI 23/30464970 DC 2023
BS EN ISO/IEC 27013:2021/Amd 1 Information security, cybersecurity and privacy protection. Guidance on the integrated…
-
BS ISO/IEC 27009:2016
Information technology. Security techniques. Sector-specific application of ISO/IEC 27001. Requirements Published By Publication Date Number…
-
BSI 20/30416086 DC:2020 Edition
BS ISO/IEC 23009-8. Information technology. Dynamic adaptive streaming over HTTP (DASH) – Part 8. Session-based…
-
BS ISO/IEC 27003:2010
Information technology. Security techniques. Information security management system implementation guidance Published By Publication Date Number…
-
BSI 20/30405750 DC 2020
BS ISO/IEC 23009-1 AMD1: Information technology. Dynamic adaptive streaming over HTTP (DASH) – Part 1.…
-
BS EN ISO/IEC 27000:2020
Information technology. Security techniques. Information security management systems. Overview and vocabulary Published By Publication Date…
-
BS EN ISO/IEC 27006:2020
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management…
-
BSI 24/30487296 DC 2024
BS ISO/IEC 23009-1. Information technology. Dynamic adaptive streaming over HTTP (DASH) – Part 1. Media…
-
BSI 22/30437360 DC 2022
BS ISO/IEC 27001 AMD 1. Information technology. Security techniques. Information security management systems. Requirements Published…
-
BS EN ISO/IEC 27019:2020
Information technology. Security techniques. Information security controls for the energy utility industry Published By Publication…
-
BSI 21/30390394 DC:2021 Edition
BS ISO/IEC 27002. Information security, cybersecurity and privacy protection. Information security controls Published By Publication…
-
BS ISO/IEC 20926:2009 2010
Software and systems engineering. Software measurement. IFPUG functional size measurement method 2009 Published By Publication…
-
BSI 22/30435771 DC:2022 Edition
BS ISO/IEC 23009-8 AMD1. Information technology. Dynamic adaptive streaming over HTTP (DASH) – Part 8.…
-
BS EN ISO/IEC 27019:2020
Information technology. Security techniques. Information security controls for the energy utility industry Published By Publication…
-
BSI 21/30389093 DC:2021 Edition
BS ISO/IEC 27099. Information Technology. Public key infrastructure. Practices and policy framework Published By Publication…
-
BS EN ISO/IEC 27001:2023 – TC
Tracked Changes. Information security, cybersecurity and privacy protection. Information security management systems. Requirements Published By…
-
BS ISO/IEC 9798-5:2009 2010
Information technology. Security techniques. Entity authentication – Mechanisms using zero knowledge techniques Published By Publication…
-
BS ISO/IEC 27006:2015+A1:2020
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management…
-
BS ISO/IEC 24735:2009 2010
Information technology. Office equipment. Method for measuring digital copying machine productivity Published By Publication Date…
-
BSI 21/30412540 DC:2021 Edition
BS ISO/IEC 27005. Information security, cybersecurity and privacy protection. Guidance on managing information security risks…
-
BS EN ISO/IEC 27006:2020 2021
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management…
-
BSI 23/30464915 DC:2023 Edition
BS EN ISO/IEC 27019 Information technology. Security techniques. Information security controls for the energy utility…
-
BS ISO/IEC 20009-3:2022
Information security. Anonymous entity authentication – Mechanisms based on blind signatures Published By Publication Date…
-
BS EN ISO/IEC 27006:2020 2021
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management…
-
BSI 21/30398709 DC:2020 Edition
BS ISO/IEC 27013. Information security, cybersecurity and privacy protection. Guidance on the integrated implementation of…
-
BSI 22/30412537 DC:2022 Edition
BS ISO/IEC 27011. Information technology. Security techniques. Code of practice for Information security controls based…
-
BSI 24/30476110 DC:2024 Edition
BS EN ISO/IEC 15944-7:2009/Amd 1 Information technology – Business operational view – Part 7: eBusiness…
-
BS ISO/IEC 27001:2022
Information security, cybersecurity and privacy protection. Information security management systems. Requirements Published By Publication Date…
-
BS EN ISO/IEC 27006-1:2024
Information security, cybersecurity and privacy protection. Requirements for bodies providing audit and certification of information…
-
BSI 22/30440731 DC:2022 Edition
BS ISO/IEC 23009-1 AMD 1. Information technology. Dynamic adaptive streaming over HTTP (DASH) – Part…
-
BS EN ISO/IEC 15408-1:2020
Information technology. Security techniques. Evaluation criteria for IT security – Introduction and general model Published…