Norme NBN ISO/IEC 27036-2:2014
Technologies de l'information - Techniques de sécurité - Sécurité d'information pour la relation avec le fournisseur - Partie 2: Exigences (ISO/IEC 27036-2:2014)
Date de publication
35.040 Jeux de caractères et codage de l'information
This part of ISO/IEC 27036 specifies fundamental information securit y requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships. These requirements cover any procurement and supply of products and services, such as manufacturing or assembly, business process procurement, sof t ware and hardware components, knowledge process procurement, Build-Operate-Transfer and cloud computing services. These requirements are intended to be applicable to all organizations, regardless of t ype, size and nature. To meet these requirements, an organization should have already internally implemented a number of foundational processes, or be actively planning to do so. These processes include, but are not limited to, the following: governance, business management, risk management, operational and human resources management, and information securit y.