{"id":1956,"date":"2019-02-06T09:42:58","date_gmt":"2019-02-06T09:42:58","guid":{"rendered":"http:\/\/iqs-ltd.com\/?page_id=1956"},"modified":"2019-02-06T09:43:00","modified_gmt":"2019-02-06T09:43:00","slug":"iso-27002","status":"publish","type":"page","link":"https:\/\/iqs-ltd.com\/fr\/iso-27002\/","title":{"rendered":"ISO 27002"},"content":{"rendered":"<h2><strong>ISO\/IEC 27002:2013<\/strong><\/h2>\n<h2>Information technology &#8212; Security techniques &#8212; Code of practice for information security controls<\/h2>\n<p>ISO\/IEC 27002:2013 gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organization&#8217;s information security risk environment(s).<\/p>\n<p>It is designed to be used by organizations that intend to:<\/p>\n<ol>\n<li>select controls within the process of implementing an Information Security Management System based on ISO\/IEC 27001;<\/li>\n<li>implement commonly accepted information security controls;<\/li>\n<li>develop their own information security management guidelines.<\/li>\n<\/ol>\n<p>ISO\/IEC 27002:2013 gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organization&#8217;s information security risk environment(s).<\/p>\n<p>It is designed to be used by organizations that intend to:<\/p>\n<ol>\n<li>select controls within the process of implementing an Information Security Management System based on ISO\/IEC 27001;<\/li>\n<li>implement commonly accepted information security controls;<\/li>\n<li>develop their own information security management guidelines.<\/li>\n<\/ol>\n<p>Corrigenda\/Amendments<br \/>\nISO\/IEC 27002:2013\/Cor 1:2014<br \/>\nISO\/IEC 27002:2013\/Cor 2:2015<\/p>","protected":false},"excerpt":{"rendered":"<p>ISO\/IEC 27002:2013 Information technology &#8212; Security techniques &#8212; Code of practice for information security controls ISO\/IEC 27002:2013 gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration&hellip; <\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1956","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/iqs-ltd.com\/fr\/wp-json\/wp\/v2\/pages\/1956","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iqs-ltd.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/iqs-ltd.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/iqs-ltd.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iqs-ltd.com\/fr\/wp-json\/wp\/v2\/comments?post=1956"}],"version-history":[{"count":1,"href":"https:\/\/iqs-ltd.com\/fr\/wp-json\/wp\/v2\/pages\/1956\/revisions"}],"predecessor-version":[{"id":1957,"href":"https:\/\/iqs-ltd.com\/fr\/wp-json\/wp\/v2\/pages\/1956\/revisions\/1957"}],"wp:attachment":[{"href":"https:\/\/iqs-ltd.com\/fr\/wp-json\/wp\/v2\/media?parent=1956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}