ISO and IEC procedural documentation
(the Journal contains articles about the standards developed by SC 27 from working group experts)
• Volume 1, Issue 1 March 2021 – Information Security Management Systems
• Volume 1, Issue 2 July 2021 – Security Controls and Services
• Volume 1, Issue 3 Feb 2022 – Cryptography and Security Mechanisms
• Volume 2, Issue 1 March 2022 – International 27001 Day
• Volume 2, Issue 2 July 2022 – ISO/IEC 27002:2022
• Volume 3, Issue 1 January 2023 - International 27001 Day
(Standing Documents provide a range of use information about the SC 27 work programme, glossary of terms, reference lists e.g. on privacy and other useful data relating to SC 27 standards)
- SC27 SD6 Glossary of IT Security Terminology
- SC27 SD11 SC 27 Structure, Members and Work Programme
- SC27 SD12 Assessment of Cryptographic Techniques and Key Lengths
- SC27 SD16 Information Security Library (ISL) based on ISO/IEC 27000 family of standards within SC 27
- SC27 SD18 Structure and Scope
- SC27 SD27 Benefits of Hosting SC27 Meetings
- SC27WG2 SD4 Analysis and status of cryptographic algorithms
- SC27WG2 SD5 Process for inclusion and deletion of Cryptographic Mechanisms
- SC27WG2 SD6 Guidelines for effective communications on security mechanism issues
- SC27WG2 SD8 Post-Quantum Cryptography
- SC27WG2 SD7 Conversion functions
- SC27WG5 SD1 Roadmap
- SC27WG5 SD2 Privacy References List
- SC27WG5 SD4 Standard Privacy Assessment (SPA)
WG 1 CONFORMITY ASSESSMENT ADVISORY NOTES
• WG 1 CATF Advisory Note 1 - Why Is ISO/IEC 27001 Sufficient for the disciplines of Information Security and Cybersecurity?
WG 1 ISO/IEC 27001 AUDITOR PRACTICE NOTES
• Auditing Competence
• Context
• Improvements
• Internal Audit
• Risk Management
• Use of Annex A (ISO/IEC 27001)
• Use of SoA (ISO/IEC 27001 Statement of Applicability)
ISO ARTICLES
• Keeping consumers and citizens safe and secure (2021-05-06)
• The cybersecurity skills gap (2021-04-15)
• Protecting our privacy in smart cities (2021-02-18)
• Keeping cybersafe (2021-02-16)
• Biometric security (2021-01-14)
• Keeping an eye on information security (2020-12-16)
• Getting big on data (2020-11-05)
• Keeping cyberspace safe for 30 years (2020-10-02)
• Safe, secure and private, whatever your business (2020-05-04)
• How Microsoft makes your data its priority (2020-03-10)
• Guidance for information security management systems auditors just updated (2020-01-27)
• Its all about trust (2019-11-11)
• Are we safe in the internet of things? (2019-09-05)
• Tackling privacy information management head on: first international standard just published (2019-08-06)
• Stronger data protection with updated guidelines on assessing information security controls (2019-02-04)
• Cracking down on cyber challenges in the latest ISO Focus (2019-01-10)
• How to tackle todays IT security risks (2019-01-10)
• How to measure the effectiveness of information security (2016-12-16)
• Common terminology for information security management just revised (2016-02-18)
• Security toolbox protects organizations from cyber-attacks (2015-12-17)
• IT security experts win technical excellence award (2015-09-17)
• Safeguard your information with new IT security collection (2013-11-18)
• Are you prepared for information security breaches? new ISO/IEC 27001 can help (2013-10-04)
• New version of ISO/IEC 27001 to better tackle IT security risks (2013-08-14)
IEC ARTICLES
• Cyber security for IT and OT supply chains (2021-02-03)
• Securing IT and OT supply chains with international standards and conformity assessment (2021-02-01)
• Effective governance is the key to cyber security
• Eight things organizations should do to ensure compliance with cyber security regulations
WG 1 CONFORMITY ASSESSMENT ADVISORY NOTES
WG 1 ISO/IEC 27001 AUDITOR PRACTICE NOTES