ISO/IEC 27001:2005

International Standard   Historical · Approved on 14 October 2005

Information technology — Security techniques — Information security management systems — Requirements

ISO/IEC 27001:2005 Files

English 34 Pages
Historical
29.73 BHD

ISO/IEC 27001:2005 Scope

ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof.

ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties.

ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following:

  • use within organizations to formulate security requirements and objectives;
  • use within organizations as a way to ensure that security risks are cost effectively managed;
  • use within organizations to ensure compliance with laws and regulations;
  • use within an organization as a process framework for the implementation and management of controls to ensure that the specific security objectives of an organization are met;
  • definition of new information security management processes;
  • identification and clarification of existing information security management processes;
  • use by the management of organizations to determine the status of information security management activities;
  • use by the internal and external auditors of organizations to determine the degree of compliance with the policies, directives and standards adopted by an organization;
  • use by organizations to provide relevant information about information security policies, directives, standards and procedures to trading partners and other organizations with whom they interact for operational or commercial reasons;
  • implementation of business-enabling information security;
  • use by organizations to provide relevant information about information security to customers.

Best Sellers

GSO 150-2:2013
 
Gulf Standard
Expiration dates for food products - Part 2 : Voluntary expiration dates
BH GSO 150-2:2015
GSO 150-2:2013 
Bahraini Standard
Expiration dates for food products - Part 2 : Voluntary expiration dates
BH GSO 2055-1:2016
GSO 2055-1:2015 
Bahraini Technical Regulation
HALAL FOOD - Part 1 : General Requirements
GSO 2055-1:2015
 
Gulf Technical Regulation
HALAL FOOD - Part 1 : General Requirements

Recently Published

ISO/TR 24589-2:2025
 
International Standard
Examples of good practice for the management of assets of water supply and wastewater systems — Part 2: Wastewater systems
ISO/TS 20721:2025
 
International Standard
Implants for surgery — Absorbable implants — General guidelines and requirements for assessment of absorbable metallic implants
ISO/IEC TS 20540:2025
 
International Standard
Information security, cybersecurity and privacy protection — Testing cryptographic modules in their field
ISO 834-1:2025
 
International Standard
Fire-resistance tests — Elements of building construction — Part 1: General requirements