{"id":126111,"date":"2024-10-19T05:32:47","date_gmt":"2024-10-19T05:32:47","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-270052024\/"},"modified":"2024-10-24T23:17:58","modified_gmt":"2024-10-24T23:17:58","slug":"bs-en-iso-iec-270052024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-270052024\/","title":{"rendered":"BS EN ISO\/IEC 27005:2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | European foreword Endorsement notice <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 \u200bScope 2 \u200bNormative references 3 \u200bTerms and definitions 3.1 \u200bTerms related to information security risk <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3.2 \u200bTerms related to information security risk management <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4 \u200bStructure of this document 5 \u200bInformation security risk management 5.1 \u200bInformation security risk management process <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.2 \u200bInformation security risk management cycles 6 \u200bContext establishment 6.1 \u200bOrganizational considerations <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.2 \u200bIdentifying basic requirements of interested parties 6.3 \u200bApplying risk assessment <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.4 \u200bEstablishing and maintaining information security risk criteria 6.4.1 \u200bGeneral 6.4.2 \u200bRisk acceptance criteria <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.4.3 \u200bCriteria for performing information security risk assessments <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.5 \u200bChoosing an appropriate method <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7 \u200bInformation security risk assessment process 7.1 \u200bGeneral <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7.2 \u200bIdentifying information security risks 7.2.1 \u200bIdentifying and describing information security risks <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.2.2 \u200bIdentifying risk owners <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.3 \u200bAnalysing information security risks 7.3.1 \u200bGeneral 7.3.2 \u200bAssessing potential consequences <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.3.3 \u200bAssessing likelihood <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7.3.4 \u200bDetermining the levels of risk 7.4 \u200bEvaluating the information security risks 7.4.1 \u200bComparing the results of risk analysis with the risk criteria <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7.4.2 \u200bPrioritizing the analysed risks for risk treatment 8 \u200bInformation security risk treatment process 8.1 \u200bGeneral 8.2 \u200bSelecting appropriate information security risk treatment options <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 8.3 \u200bDetermining all controls that are necessary to implement the information security risk treatment options <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 8.4 \u200bComparing the controls determined with those in ISO\/IEC 27001:2022, Annex A 8.5 \u200bProducing a Statement of Applicability <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 8.6 \u200bInformation security risk treatment plan 8.6.1 \u200bFormulation of the risk treatment plan <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 8.6.2 \u200bApproval by risk owners <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 8.6.3 \u200bAcceptance of the residual information security risks <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 9 \u200bOperation 9.1 \u200bPerforming information security risk assessment process 9.2 \u200bPerforming information security risk treatment process <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 10 \u200bLeveraging related ISMS processes 10.1 \u200bContext of the organization 10.2 \u200bLeadership and commitment <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 10.3 \u200bCommunication and consultation <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 10.4 \u200bDocumented information 10.4.1 \u200bGeneral 10.4.2 \u200bDocumented information about processes 10.4.3 \u200bDocumented information about results <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 10.5 \u200bMonitoring and review 10.5.1 \u200bGeneral <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 10.5.2 \u200bMonitoring and reviewing factors influencing risks <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 10.6 \u200bManagement review 10.7 \u200bCorrective action <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 10.8 \u200bContinual improvement <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Annex A (informative) Examples of techniques in support of the risk assessment process <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Guidance on managing information security risks<\/b><\/p>\n |