ISO/IEC TR 27008:2011 - Information technology — Security techniques — Guidelines for auditors on information security controls
Archived
Published on: 09/10/2017
Last update: 22/10/2019
This standard provides guidance for all auditors regarding “information security management systems controls” selected through a risk-based approach (e.g. as presented in a statement of applicability) for information security management. It supports the information risk management process and internal, external and third-party audits of an ISMS by explaining the relationship between the ISMS and its supporting controls. It provides guidance on how to verify the extent to which required “ISMS controls” are implemented. Furthermore, it supports any organization using ISO/IEC 27001 and ISO/IEC 27002 to satisfy assurance requirements, and as a strategic platform for information security governance.
Categorisation
Format
PDF
Status
Completed
Representation technique
Human Language