ISO IEC 27001 CORR 2-2015 Information technology - Security techniques - Information security management systems - Requirements Technical Corrigendum 2《信息技术 安全技.pdf
-
资源ID:1257156
资源大小:63.88KB
全文页数:2页
- 资源格式: PDF
下载积分:10000积分
快捷下载

账号登录下载
微信登录下载
下载资源需要10000积分(如需开发票,请勿充值!)
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
|
ISO IEC 27001 CORR 2-2015 Information technology - Security techniques - Information security management systems - Requirements Technical Corrigendum 2《信息技术 安全技.pdf
1、 INTERNATIONAL STANDARD ISO/IEC 27001:2013 TECHNICAL CORRIGENDUM 2 Published 2015-12-01 INTERNATIONAL ORGANIZATION FOR STANDARDIZATION ORGANISATION INTERNATIONALE DE NORMALISATION INTERNATIONAL ELECTROTECHNICAL COMMISSION COMMISSION LECTROTECHNIQUE INTERNATIONALEInformation technology Security techn
2、iques Information security management systems Requirements TECHNICAL CORRIGENDUM 2 Technologies de linformation Techniques de scurit Systmes de management de la scurit de linformation Exigences RECTIFICATIF TECHNIQUE 2 Technical Corrigendum 1 to ISO/IEC 27001:2013 was prepared by Joint Technical Com
3、mittee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques ICS 35.040 Ref. No. ISO/IEC 27001:2013/Cor.2:2015(E) ISO/IEC 2015 All rights reserved Published in Switzerland ISO/IEC 27001:2013/Cor.2:2015(E) 2 ISO/IEC 2015 All rights reservedPage 4, Subclause 6.1.3 Replace C
4、ontrol d) produce a Statement of Applicability that contains the necessary controls (see 6.1.3 b) and c) and justification for inclusions, whether they are implemented or not, and the justification for exclusions of controls from Annex A; with Control d) produce a Statement of Applicability that contains: the necessary controls (see 6.1.3 b) and c); justification for their inclusion; whether the necessary controls are implemented or not; and the justification for excluding any of the Annex A controls.