Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Secure PDF

      Secure PDF Files

      Secure PDF files include digital rights management (DRM) software. DRM is included at the request of the publisher, as it helps them protect their copyright by restricting file sharing. In order to read a Secure PDF, you will need to install the FileOpen Plug-In on your computer. The FileOpen Plug-In works with Adobe Reader and other viewers. Visit FileOpen to see the full list.

        What you can do with a Secure PDF:
      • Print
      • Search
      • Highlight
      • Bookmark
      Please note that some publishers - including BOMA, IADC and NRC - do not allow printing of their documents.

    • 👥
    • Immediate download
    • $358.14
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $358.14
    • Add to Cart
    • Printed Edition + PDF
    • Immediate download
    • $483.87
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

BS PD ISO/IEC TS 27008:2019 provides guidance on reviewing and assessing the implementation and operation of information security controls, including the technical assessment of information system controls, in compliance with an organization's established information security requirements including technical compliance against assessment criteria based on the information security requirements established by the organization.


Cross References:
ISO/IEC 27000
ISO/IEC 27017:2015
ISO/IEC 27007
ISO/IEC 27006
ISO/IEC 27002
ISO Guide 73
ISO/IEC 27017
NIST 800-53A
ISO/IEC 27005
ISO/IEC 27001
ISO 19011:2018


All current amendments available at time of purchase are included with the purchase of this document.
 

Document History

  1. BS PD ISO/IEC TS 27008:2019

    👀currently
    viewing


    Information technology. Security techniques. Guidelines for the assessment of information security controls

    • Most Recent
  2. BS PD ISO/IEC TR 27008:2011


    Information technology. Security techniques. Guidelines for auditors on information security controls

    • Historical Version