1 / 78
文档名称:

Iso-Iec 27003-2009_Information security management system implementation guidance.pdf

格式:pdf   页数:78
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Iso-Iec 27003-2009_Information security management system implementation guidance.pdf

上传人:kuo08091 2014/2/19 文件大小:0 KB

下载得到文件列表

Iso-Iec 27003-2009_Information security management system implementation guidance.pdf

文档介绍

文档介绍:ISO/IEC JTC 1/SC 27 N7977
ISO/IEC JTC 1/SC 27/WG 1 N17977
REPLACES: N7806

ISO/IEC JTC 1/SC 27
Information technology – Security techniques
Secretariat: DIN, Germany

DOC. TYPE: text for FDIS ballot submitted by ITTF

TITLE: Text of ISO/IEC FDIS 27003 -- Information technology -- Security techniques --
Information security management system implementation guidance

SOURCE: ITTF

DATE: 2009-10-09

PROJECT: 27003

STATUS: This document is currently undergoing a 2-month FDIS letter ballot at the JTC1 level.

The P-members of JTC 1 and SC 27 are kindly requested to submit their votes
on ISO/IEC FDIS 27003 directly to the ISO Central Secretariat via the ISO e-balloting
application by 2009-12-09.

This document is being circulated within SC 27 for information.

ACTION: LB

DUE DATE: 2009-12-09

DISTRIBUTION: P-, O- and L-members
L. Rajchel, Secretariat JTC 1
K. Brannon, ITTF
W. Fumy, SC 27 Chairman
M. De Soete, SC 27 Vice-chair
E. J. Humphreys, K. Naemura, M. Bañón, M.-C. Kang, K. Rannenberg, WG-Conveners
J. Branzell, U. Chandrashekhar, S. Yamasaki, Project Co-editors

MEDIUM: Livelink-server

NO. OF PAGES: 1 + 76 + 1 (Attachment)
Secretariat ISO/IEC JTC 1/SC 27 -
DIN Deutsches Institut für Normung e. V., Burggrafenstr. 6, 10772 Berlin, Germany
Telephone: + 49 30 2601-2652; Facsimile:+ 49 30 2601-1723; E-mail: krystyna.******@
/en
FINAL INTERNATIONAL ISO/IEC
DRAFT
STANDARD FDIS
27003
ISO/IEC JTC 1
Secretariat: ANSI Information technology — Security
techniques — Information security
Voting begins on:
2009-10-09 management system implementation
guidance
Voting terminates on:
2009-12-09
Technologies de l'information — Techniques de sécurité — Directives
de mise en œuvre du système de management de la sécurité de
l'information

Please see the administrative notes on page iii

RECIPIENTS OF THIS DRAFT ARE INVITED TO
SUBMI