Properties (58)
Predicate | Object |
---|---|
gptkbp:instanceOf |
standard
|
gptkbp:aimsTo |
provide a framework for managing information security risks
|
gptkbp:appliesTo |
organizations of all sizes
|
gptkbp:developedBy |
gptkb:International_Organization_for_Standardization
|
gptkbp:facilitates |
continuous improvement in information security management
|
https://www.w3.org/2000/01/rdf-schema#label |
ISO 27000 family standards
|
gptkbp:includes |
gptkb:ISO/IEC_27006
gptkb:ISO/IEC_27004 gptkb:ISO/IEC_27005 gptkb:ISO/IEC_27002 gptkb:ISO/IEC_27003 gptkb:ISO/IEC_27008 gptkb:ISO/IEC_27007 gptkb:ISO/IEC_27009 ISO/IEC 27001 |
gptkbp:isPartOf |
gptkb:ISO/IEC_27000_series
|
gptkbp:isRelatedTo |
access control
business continuity cybersecurity encryption information technology risk management cloud security data protection incident management network security physical security security assessments security compliance security policies security architecture data classification employee training compliance audits business impact analysis vulnerability management security frameworks security metrics privacy management security controls security awareness programs security technologies data breach response security incident reporting third-party risk management security governance audit and assessment information security culture |
gptkbp:isReviewedBy |
ISO_technical_committee_1
|
gptkbp:isUpdatedBy |
gptkb:ISO/IEC_27001:2022
|
gptkbp:isUsedBy |
businesses
government agencies non-profit organizations |
gptkbp:provides |
common terminology for information security
guidelines for information security management systems |
gptkbp:publishedIn |
2016
|
gptkbp:relatedTo |
information security management
|
gptkbp:supports |
compliance with legal and regulatory requirements
|