gptkbp:instanceOf
|
gptkb:International_Standard
|
gptkbp:addresses
|
Information security risks
|
gptkbp:aimsTo
|
Provide best practices for information security
|
gptkbp:appliesTo
|
Organizations of all sizes
|
gptkbp:contains
|
Annexes
|
gptkbp:firstClaim
|
2013
|
gptkbp:firstPublished
|
2005
|
gptkbp:focusesOn
|
Information security management
|
https://www.w3.org/2000/01/rdf-schema#label
|
ISO 27002
|
gptkbp:includes
|
Security controls
|
gptkbp:isAccessibleBy
|
Risk management
|
gptkbp:isAssignedTo
|
GDPR
|
gptkbp:isAttendedBy
|
Governments
Yes
Private sector
Public sector
|
gptkbp:isAvailableIn
|
Various sectors
|
gptkbp:isCitedIn
|
Legal documents
|
gptkbp:isConsidered
|
Best practice guide
|
gptkbp:isCriticizedFor
|
Business continuity planning
|
gptkbp:isInfluencedBy
|
Information security policy
|
gptkbp:isIntegratedWith
|
Other_ISO_standards
|
gptkbp:isLocatedIn
|
gptkb:ISO_27005
|
gptkbp:isPartOf
|
gptkb:ISO/IEC_27000_family
Risk management framework
Compliance requirements
|
gptkbp:isRecognizedBy
|
Industry standards
|
gptkbp:isReferencedBy
|
Security frameworks
|
gptkbp:isReferencedIn
|
Compliance frameworks
|
gptkbp:isReviewedBy
|
ISO_member_bodies
|
gptkbp:isUpdatedBy
|
5 years
|
gptkbp:isUsedBy
|
Information security professionals
Assess security controls
|
gptkbp:isUsedFor
|
Auditing purposes
|
gptkbp:isUtilizedFor
|
Training purposes
Cybersecurity strategy
Information assurance
|
gptkbp:isVisitedBy
|
gptkb:ISO/IEC_JTC_1/SC_27
|
gptkbp:provides
|
Implementation guidance
|
gptkbp:providesGuidanceOn
|
Information security controls
|
gptkbp:publishedBy
|
gptkb:International_Organization_for_Standardization
|
gptkbp:relatedTo
|
ISO 27001
|
gptkbp:replacedBy
|
gptkb:ISO/IEC_17799
|
gptkbp:supports
|
Data protection
|
gptkbp:title
|
Code of practice for information security controls
|
gptkbp:translatedInto
|
Multiple languages
|