Management bezpečnosti informací
Pracovní program norem ISO/IEC JTC 1/SC 40 – Work Programme; ISO/IEC JTC 1/SC 27 – Work Programme; CEN/SS F12 – Work Programme
Vydané normy ISO/IEC JTC 1/SC 40 – Published Standards; ISO/IEC JTC 1/SC 27 – Published Standards; CEN/SS F12 – Published Standards
stav k 1. 1. 2020
stav v ČSN |
stav v STN |
|
ISO/IEC 20000-1:2011 Information technology – Service management – Part 1: Service management system requirements zrušena a nahrazena: |
ČSN ISO/IEC 20000-1:2012 |
STN ISO/IEC 20000-1:2014 |
ISO/IEC 20000-2:2019 |
ČSN ISO/IEC 20000-2:2013 |
STN ISO/IEC 20000-2:2017 |
ISO/IEC 20000-3:2019 |
ČSN ISO/IEC 20000-3:2014 |
nezavedena |
ISO/IEC TR 20000-7:2019 Information technology - Service management - Part 7: Guidance on the integration and correlation of ISO/IEC 20000-1:2018 to ISO 9001:2015 and ISO/IEC 27001:2013 |
||
ISO/IEC 20000-10:2018 Information technology - Service management - Part 10: Concepts and terminology |
||
ISO/IEC TR 20000-12:2016 V revizi: |
||
ISO/IEC WD TR 20000-13 Information technology - Service management - Part 13: Guidance on the relationship between ISO/IEC 20000-1:2018 and service management frameworks: COBIT |
||
ISO/IEC PRF TR 22564-1.2 Information technology - Service management of infrastructure - Part 1: Process reference model (PRM) for data centre services |
||
ISO/IEC CD TR 30105-6 Information technology - IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes - Part 6: Guidelines on risk management |
||
ISO/IEC TR 30105-7 Information technology - IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes - Part 7: Exemplar for maturity assessment | ||
ISO/IEC CD 38503 Information technology - Governance of IT - Assessment of governance of IT | ||
ISO/IEC 38506:2020 Information technology - Governance of IT - Application of ISO/IEC 38500 to the governance of IT-enabled Investments | ||
ISO/IEC AWI 38507 Information technology - Governance of IT - Governance implications of the use of artificial intelligence by organizations |
CEN/SS F12 |
stav v ČSN |
stav v STN |
|
ISO/IEC 27000:2016 |
ČSN ISO/IEC 27000:2017 |
STN ISO/IEC 27000:2014 |
|
ISO/IEC 27001:2013 Information technology - Security techniques - Information security management systems – Requirements |
ČSN ISO/IEC 27001:2014 |
STN ISO/IEC 27001:2014 |
|
ISO/IEC 27002:2013 Information technology - Security techniques - Code of practice for information security controls V revizi: |
ČSN ISO/IEC 27002:2014 |
STN ISO/IEC 27002:2014 Informačné technológie. Bezpečnostné metódy. Pravidlá dobrej praxe riadenia informačnej bezpečnosti |
|
ISO/IEC 27003:2010 Information technology - Security techniques - Information security management system implementation guidance |
ČSN ISO/IEC 27003:2011 |
nezavedena |
|
ISO/IEC 27004:2009 Information technology - Security techniques - Information security management - Measurement |
ČSN ISO/IEC 27004:2011 |
nezavedena |
|
ISO/IEC 27005:2018 Information technology - Security techniques - Information security risk management |
ČSN ISO/IEC 27005:2019
|
STN ISO/IEC 27005:2012 |
|
ISO/IEC 27006:2015 Information technology - Security techniques - Requirements - for bodies providing audit and certification of information security management systems |
ČSN ISO/IEC 27006:2016 |
nezavedena |
|
ISO/IEC 27007:2017 Information Technology - Security techniques - Guidelines for information security management systems auditing |
|
nezavedena |
|
ISO/IEC 27011:2016 Information technology - Security techniques - Information security management guidelines for telecommunications organizations based on ISO/IEC 27002 |
nezavedena |
nezavedena |
|
ISO/IEC 27017:2015 Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
ČSN ISO/IEC 27017:2017 |
nezavedena |
|
ISO/IEC 27031:2011 Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity |
ČSN ISO/IEC 27031:2016 |
nezavedena |
|
ISO/IEC 27032:2012 Information technology - Security techniques - Guidelines for cybersecurity |
ČSN ISO/IEC 27032:2013 |
nezavedena |
|
ISO/IEC 27033-1:2015 Information technology - Security techniques - Network security - Part 1: Overview and concepts |
ČSN ISO/IEC 27033-1:2016 |
nezavedena |
|
ISO/IEC 27033-2:2012 Information technology - Security techniques - Network security - Part 2: Guidelines for the design and implementation of network security |
ČSN ISO/IEC 27033-2:2015 |
nezavedena |
|
ISO/IEC 27033-3:2010 Information technology - Security techniques - Network security - Part 3: Reference networking scenarios - Threats, design techniques and control issues |
ČSN ISO/IEC 27033-3:2015 |
nezavedena |
|
ISO/IEC 27033-5:2013 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Networks (VPNs) |
ČSN ISO/IEC 27033-5:2016 |
nezavedena |
|
ISO/IEC 27034-1:2011 Information technology - Security techniques - Application security - Part 1: Overview and concepts |
ČSN ISO/IEC 27034-1:2014 |
nezavedena |
|
ISO/IEC 27034-3:2018 Information technology - Application security - Part 3: Application security management proces |
|||
ISO/IEC 27035-1:2016 Information technology - Security techniques - Information security incident management - Part 1: Principles of incident management |
ČSN ISO/IEC 27035-1:2018 |
nezavedena |
|
ISO/IEC 27035-2:2016 Information technology - Security techniques - Information security incident management - Part 2: Guidelines to plan and prepare for incident response |
ČSN ISO/IEC 27035-2:2018 |
nezavedena |
|
ISO/IEC 27037:2012 Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence |
ČSN EN ISO/IEC 27037:2017 |
STN EN ISO/IEC 27037:2017 |
|
ISO/IEC 27038:2014 Information technology - Security techniques - Specification for digital redaction (ISO/IEC 27038:2014) |
ČSN EN ISO/IEC 27038:2017 |
STN EN ISO/IEC 27038:2017 |
|
ISO/IEC 27039:2015 Information technology - Security techniques - Selection, deployment and operations of intrusion detection and prevention systems (IDPS) |
|||
ISO/IEC 27040:2015 Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
ČSN EN ISO/IEC 27040:2017 |
STN EN ISO/IEC 27040:2017 |
|
ISO/IEC 27041:2015 Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method |
ČSN EN ISO/IEC 27041:2017 |
STN EN ISO/IEC 27041:2017 |
|
ISO/IEC 27042:2015 Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence |
ČSN EN ISO/IEC 27042:2017 |
STN EN ISO/IEC 27042:2017 |
|
ISO/IEC 27043:2015 Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015) |
ČSN EN ISO/IEC 27043:2017 |
STN EN ISO/IEC 27043:2017 |
|
ISO/IEC 29100:2011 Information technology - Security techniques - Privacy framework |
ČSN ISO/IEC 29100:2015 |
nezavedena |
|
ISO/IEC 29101:2013 Information technology - Security techniques - Privacy architecture framewwork |
ČSN ISO/IEC 29101:2016 |
nezavedena |
|
ISO/IEC 27102:2019 Information technology - Security techniques - Information security management guidelines for cyber insurance |
|||
ISO/IEC 29128:2011 Information technology - Security techniques - Verification of cryptographic protocols |
ČSN ISO/IEC 29128:2016 |
nezavedena |
|
ISO/IEC 30111:2013 Information technology - Security techniques - Vulnerability handling processes |
ČSN ISO/IEC 30111:2016 |
nezavedena |
|
ISO/IEC 30121:2015 Information technology - Governance of digital forensic risk framework (ISO/IEC 30121:2015) |
ČSN EN ISO/IEC 30121 |
STN EN ISO/IEC 30121:2017 |