REGISTER

FR
Search
×
FR

Placeholder headline

This is just a placeholder headline

API SPEC 14L: Lock Mandrels and Landing Nipples : Reaffirmed

$

273

BUY NOW

Placeholder headline

This is just a placeholder headline

API SPEC 20F: Corrosion Resistant Bolting for Use in the Petroleum and Natural Gas Industries : Reaffirmed

$

169

BUY NOW

Placeholder headline

This is just a placeholder headline

API TR 5NCL Nickel Content Limits for API 5CT Sour Service Products

$

149

BUY NOW

Placeholder headline

This is just a placeholder headline

API SPEC 19ICD: Inflow Control Devices : Reaffirmed

$

189

BUY NOW

Placeholder headline

This is just a placeholder headline

API MPMS CH 23.2: Reconciliation of Liquid Tank Car(s) Quantities : Reaffirmed

$

218

BUY NOW

Placeholder headline

This is just a placeholder headline

API SPEC 16A: Specification for Drill-through Equipment

$

322

BUY NOW

Placeholder headline

This is just a placeholder headline

API RP 13B-2: Field Testing Oil-based Drilling Fluids wA1

$

388

BUY NOW

ISO 27001:2022

ISO 27001:2022 Information security, cybersecurity and privacy protection – Information security management systems – Requirements

CDN $233.00

SKU: 7204407ff30a Categories: ,

Description

This document specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. This document also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in this document are generic and are intended to be applicable to all organizations, regardless of type, size or nature. Excluding any of the requirements specified in Clauses 4 to 10 is not acceptable when an organization claims conformity to this document.

Edition

3

Published Date

2022-10-25

Status

PUBLISHED

Pages

19

Language Detail Icon

English

Format Secure Icon

Secure PDF

Abstract

This document specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. This document also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in this document are generic and are intended to be applicable to all organizations, regardless of type, size or nature. Excluding any of the requirements specified in Clauses 4 to 10 is not acceptable when an organization claims conformity to this document.

Previous Editions

Can’t find what you are looking for?

Please contact us at: