{"id":1147,"date":"2018-03-11T04:38:29","date_gmt":"2018-03-11T01:38:29","guid":{"rendered":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/?page_id=1147"},"modified":"2018-03-12T11:16:51","modified_gmt":"2018-03-12T08:16:51","slug":"isoiec-27002-code-of-practice-for-information-security-controls","status":"publish","type":"page","link":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/information-security-management\/isoiec-27002-code-of-practice-for-information-security-controls\/","title":{"rendered":"ISO\/IEC 27002 &#8211; Code of Practice for Information Security Controls"},"content":{"rendered":"<!--[fluid]--><!--{content}-->    <!--[section]-->\n\t\t<style>\n.bd-section-1924094169{background-color:#0aa6ce;}\n.bd-section-1924094169{\n\ttext-align:  center;\n}\n<\/style>\t\t<section id=section33 class=\" bd-section-1924094169 bd-page-width  bd-tagstyles\" data-section-title=\"ISO\/IEC 27002 - Code of Practice for Information Security Controls, CPISC, Information Security Management, ISO 27002\">\n\t\t\t<div class=\"bd-container-inner bd-margins clearfix\">\n\t\t\t\t<!--{content}-->\n\t\t\t\t\t<!--[image]--><style>\n.additional-class-172994301{width:100%;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/11\/iso-iec-27002.jpg\" alt=\"ISO\/IEC 27002 - Code of Practice for Information Security Controls, CPISC, Information Security Management, ISO 27002\" class=\" additional-class-172994301   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\t\t\t\t<!--{\/content}-->\n\t\t\t<\/div>\n\t\t<\/section>\n\t<!--[\/section]-->\n<!--{\/content}--><!--[\/fluid]-->\n    <!--[section]-->\n\t\t\t\t<section id=section5 class=\" bd-section-1099426935  bd-tagstyles\" data-section-title=\"\">\n\t\t\t<div class=\"bd-container-inner bd-margins clearfix\">\n\t\t\t\t<!--{content}-->\n\t\t\t\t\t    <!--[columns]-->\n        <style>\n.bd-layoutcontainer-464746714 > .bd-container-inner > .container-fluid > .row{height:100%;margin:0px;}\n.bd-layoutcontainer-464746714 > .bd-container-inner > .container-fluid > .row > div{padding:0px;}\n.bd-layoutcontainer-464746714  > .bd-container-inner > .container-fluid:after{display:none;}<\/style><style>\n.bd-layoutcontainer-464746714 > .bd-container-inner > .container-fluid, .bd-layoutcontainer-464746714 > .bd-container-inner > .container-fluid > .row{height:100%;}<\/style><style>.bd-layoutcontainer-464746714 > .bd-container-inner > .container-fluid {padding-left: 0; padding-right: 0;}<\/style>        <style>\n.bd-layoutcolumn-1794019054{background-color:#ffffff;min-height:250px;-webkit-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-o-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-ms-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-moz-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);margin:-4em 2em 2em;padding:2em;border-radius:20px;}\n@media (max-width: 767px) {.bd-layoutcolumn-1794019054{margin:-2em 1em 2em;}}<\/style>        <div class=\" bd-layoutcontainer-464746714  bd-columns bd-no-margins\">\n            <div class=\"bd-container-inner\">\n                <div class=\"container-fluid\">\n                    <div class=\"row bd-row-flex bd-row-align-middle\">\n                        <!--{content}-->\n                                <!--[column]-->\n        <div class=\"col-lg-12 bd-columnwrapper-1794019054\">\n            <div class=\"bd-column  bd-layoutcolumn-1794019054  bd-no-margins\">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[html]--><style>\n.additional-class-740712221{padding-right:1em;padding-left:1em;}<\/style><style><\/style><div class=\"bd-tagstyles  additional-class-740712221 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h1>ISO\/IEC 27002 - Code of Practice for Information Security Controls (CPISC)<\/h1>\r\n<h5 style=\"text-align:center\"><b>Information Security Management<\/b><\/h5>\r\n\r\n<p>The <b>ISO\/IEC 27002 (ISO 27002) Standard<\/b> was originally published as a rename of the existing ISO 17799 standard, a code of practice for information security. It basically outlines hundreds of potential controls and control mechanisms, which may be implemented, in theory, subject to the guidance provided within ISO 27001.<\/p>\r\n\r\n<p>Organizations adopting <b>Code of Practice for Information Security Controls (CPISC)<\/b> assess their own information risks, clarify their control objectives and apply suitable controls using the standard for guidance.<\/p>\r\n<h3><b>Sections of ISO\/IEC 27002 (ISO 27002)<\/b><\/h3>\r\n<ul>\r\n<li>Section 0 : Introduction<\/li>\r\n<li>Section 1 : Scope<\/li>\r\n<li>Section 2 : Normative References<\/li>\r\n<li>Section 3  : Terms and Definitions<\/li>\r\n<li>Section 4 : Structure of this Standard<\/li>\r\n<li>Section 5 : Information Security Policies<\/li>\r\n<li>Section 6 : Organization of Information Security<\/li>\r\n<li>Section 7 : Human Resources Security<\/li>\r\n<li>Section 8 : Asset Management<\/li>\r\n<li>Section 9 : Access Control<\/li>\r\n<li>Section 10 : Cryptography<\/li>\r\n<li>Section 11 : Physical and Environmental Security<\/li>\r\n<li>Section 12 : Operations Security<\/li>\r\n<li>Section 13 : Communications Security<\/li>\r\n<li>Section 14 : Systems Acquisition, Development and Maintenance<\/li>\r\n<li>Section 15 : Supplier Relationships<\/li>\r\n<li>Section 16 : Information Security Incident Management<\/li>\r\n<li>Section 17 : Information Security Aspects of Business Continuity Management<\/li>\r\n<li>Section 18 : Compliance<\/li>\r\n<\/ul><!--{\/content}--><\/div><\/div><!--[\/html]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n                        <!--{\/content}-->\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/columns]-->\n\t\t\t\t<!--{\/content}-->\n\t\t\t<\/div>\n\t\t<\/section>\n\t<!--[\/section]-->\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2165,"parent":775,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/1147"}],"collection":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/comments?post=1147"}],"version-history":[{"count":0,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/1147\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/media\/2165"}],"wp:attachment":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/media?parent=1147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}