{"id":409042,"date":"2024-10-20T05:33:40","date_gmt":"2024-10-20T05:33:40","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-270052022\/"},"modified":"2024-10-26T10:10:49","modified_gmt":"2024-10-26T10:10:49","slug":"bs-iso-iec-270052022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-270052022\/","title":{"rendered":"BS ISO\/IEC 27005:2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 \u200bScope
2 \u200bNormative references
3 \u200bTerms and definitions
3.1 \u200bTerms related to information security risk <\/td>\n<\/tr>\n
13<\/td>\n3.2 \u200bTerms related to information security risk management <\/td>\n<\/tr>\n
15<\/td>\n4 \u200bStructure of this document
5 \u200bInformation security risk management
5.1 \u200bInformation security risk management process <\/td>\n<\/tr>\n
17<\/td>\n5.2 \u200bInformation security risk management cycles
6 \u200bContext establishment
6.1 \u200bOrganizational considerations <\/td>\n<\/tr>\n
18<\/td>\n6.2 \u200bIdentifying basic requirements of interested parties
6.3 \u200bApplying risk assessment <\/td>\n<\/tr>\n
19<\/td>\n6.4 \u200bEstablishing and maintaining information security risk criteria
6.4.1 \u200bGeneral
6.4.2 \u200bRisk acceptance criteria <\/td>\n<\/tr>\n
21<\/td>\n6.4.3 \u200bCriteria for performing information security risk assessments <\/td>\n<\/tr>\n
23<\/td>\n6.5 \u200bChoosing an appropriate method <\/td>\n<\/tr>\n
24<\/td>\n7 \u200bInformation security risk assessment process
7.1 \u200bGeneral <\/td>\n<\/tr>\n
25<\/td>\n7.2 \u200bIdentifying information security risks
7.2.1 \u200bIdentifying and describing information security risks <\/td>\n<\/tr>\n
26<\/td>\n7.2.2 \u200bIdentifying risk owners <\/td>\n<\/tr>\n
27<\/td>\n7.3 \u200bAnalysing information security risks
7.3.1 \u200bGeneral
7.3.2 \u200bAssessing potential consequences <\/td>\n<\/tr>\n
28<\/td>\n7.3.3 \u200bAssessing likelihood <\/td>\n<\/tr>\n
30<\/td>\n7.3.4 \u200bDetermining the levels of risk
7.4 \u200bEvaluating the information security risks
7.4.1 \u200bComparing the results of risk analysis with the risk criteria <\/td>\n<\/tr>\n
31<\/td>\n7.4.2 \u200bPrioritizing the analysed risks for risk treatment
8 \u200bInformation security risk treatment process
8.1 \u200bGeneral
8.2 \u200bSelecting appropriate information security risk treatment options <\/td>\n<\/tr>\n
32<\/td>\n8.3 \u200bDetermining all controls that are necessary to implement the information security risk treatment options <\/td>\n<\/tr>\n
35<\/td>\n8.4 \u200bComparing the controls determined with those in ISO\/IEC 27001:2022, Annex A
8.5 \u200bProducing a Statement of Applicability <\/td>\n<\/tr>\n
36<\/td>\n8.6 \u200bInformation security risk treatment plan
8.6.1 \u200bFormulation of the risk treatment plan <\/td>\n<\/tr>\n
37<\/td>\n8.6.2 \u200bApproval by risk owners <\/td>\n<\/tr>\n
38<\/td>\n8.6.3 \u200bAcceptance of the residual information security risks <\/td>\n<\/tr>\n
39<\/td>\n9 \u200bOperation
9.1 \u200bPerforming information security risk assessment process
9.2 \u200bPerforming information security risk treatment process <\/td>\n<\/tr>\n
40<\/td>\n10 \u200bLeveraging related ISMS processes
10.1 \u200bContext of the organization
10.2 \u200bLeadership and commitment <\/td>\n<\/tr>\n
41<\/td>\n10.3 \u200bCommunication and consultation <\/td>\n<\/tr>\n
43<\/td>\n10.4 \u200bDocumented information
10.4.1 \u200bGeneral
10.4.2 \u200bDocumented information about processes
10.4.3 \u200bDocumented information about results <\/td>\n<\/tr>\n
44<\/td>\n10.5 \u200bMonitoring and review
10.5.1 \u200bGeneral <\/td>\n<\/tr>\n
45<\/td>\n10.5.2 \u200bMonitoring and reviewing factors influencing risks <\/td>\n<\/tr>\n
46<\/td>\n10.6 \u200bManagement review
10.7 \u200bCorrective action <\/td>\n<\/tr>\n
47<\/td>\n10.8 \u200bContinual improvement <\/td>\n<\/tr>\n
49<\/td>\nAnnex A (informative) Examples of techniques in support of the risk assessment process <\/td>\n<\/tr>\n
70<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information security, cybersecurity and privacy protection. Guidance on managing information security risks<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n72<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":409050,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-409042","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/409042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/409050"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=409042"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=409042"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=409042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}