ISO/IEC 27001 audit, certification, maintenance
- Home
- CERTIFICATION OF MANAGEMENT SYSTEMS
- ISO/IEC 27001
You can always find the current edition of the standard, amendments or corrections to the standard on the website of the Lithuanian Department of Standardization.
ISO 27001 Information technology, security techniques, information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015)
This International Standard has been developed to provide a model for the development, implementation, maintenance and continuous improvement of an information security management system. The implementation of the information security management system in the company, organization is a strategic decision of the organization.
An information security management system according to ISO/IEC 27001 aims to ensure that appropriate controls for confidentiality, integrity and availability of information are implemented to protect stakeholder information. These stakeholders include customers, employees, business partners and the general needs of society. Unsecured information systems are vulnerable to many emerging threats such as computer fraud, sabotage, viruses and more. These threats can be internal or external, both accidental and intentional. A breach in information security can make vital information accessible, stolen, damaged or lost.
An organization that operates in accordance with the requirements of the ISO/IEC 27001 standard:
The information security management system can be integrated with other management systems, such as the quality management system (ISO 9001) or the environmental protection management system (ISO 14001).
When you implement, develop and plan to certify an information security management system, we advise you to refer to the accompanying requirements (some documents are relevant only for the relevant activities), such as:
LST EN ISO/IEC 27002:2017 Information Technology. Security methods. Regulations on the practice of information security control measures (ISO/IEC 27002:2013, Including Cor.1:2014 ir Cor.2:2015)
LST ISO/IEC 27005:2018 Information Technology. Security methods. Information security risk management (identical to ISO/IEC 27005:2018)
ISO/IEC 27003:2017 Information technology - Security techniques - Information security management systems - Guidance
ISO/IEC 27004:2016 Information technology - Security techniques - Information security management - Monitoring, measurement, analysis and evaluation
EN ISO/IEC 27007:2020 Informacinės technologijos. Saugumo metodai. Informacijos saugumo valdymo sistemų audito gairės (ISO/IEC 27007:2017) Information technology - Security techniques - Guidelines for information security management systems auditing (ISO/IEC 27007:2017)
ISO/IEC TS 27008:2019 Information technology - Security techniques - Guidelines for the assessment of information security controls
ISO/IEC 27009:2016 Information technology - Security techniques - Sector-specific application of ISO/IEC 27001 – Requirements
ISO/IEC 27017:2015 Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services
ISO/IEC 27011:2016 Information technology - Security techniques - Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Our website uses cookies. We use these cookies for statistical and marketing purposes.
If you consent to the use of these cookies, please click “accept” and continue browsing our website.
Our request form uses Google Recaptcha which helps us distinguish you from online robots sending us spam messages.
Thus to ensure the functioning of this request form, you have to click "accept performance cookies".
You can select which cookies are to be accepted.
Find out more about our Cookies and Privacy Policy.
Functionality (necessary) cookiesThese cookies are essential to the functioning of the website and they cannot be disabled. They do not store any personally identifiable information and are deleted once you leave the website. |
|
Performance CookiesThese cookies are used to measure the use of the website and traffic sources in order to gain information required to improve the functioning of the website. These cookies help us to determine which pages are the most popular and to learn about the users’ browsing habits. To this end we use the Google Analytics statistical engine. We do not disclose any information we have collected. All information gathered is completely anonymous and cannot identify you personally. |
|
Marketing cookiesThese third-party cookies are used to display ads personalized to your needs. We use cookies that help us to collect information on your web surfing behaviour and allow us to learn about your interests so that we could display only those ads that are relevant to you. Leave this box unchecked if you do not want us to show you any advertising. |