You are on page 1of 4

AMENDMENT NO.

1 SEPTEMBER 2020

TO

IS/ISO/IEC 27001 : 2013 INFORMATION TECHNOLOGY —


SECURITY TECHNIQUES — INFORMATION SECURITY
MANAGEMENT SYSTEMS — REQUIREMENTS

( First Revision )

This Amendment No. 1 is identical with corrigendum No. 1 of ISO/IEC 27001 : 2013 issued in 2014
and Corrigendum No. 2 of ISO/IEC 27001 : 2013 issued in 2015 issued by International Organization
for Standardization (ISO) and International Electrotechnical Commission (IEC).

Price Group 2
DRAFT TECHNICAL CORRIGENDUM ISO/IEC 27001:2013/DCOR 1

Information technology — Security techniques — Information


security management systems — Requirements

Technical corrigendum 1
Technical Corrigendum 1 to ISO/IEC 27002:2013 was prepared by Joint Technical Committee ISO/IEC JTC 1,
Information technology, Subcommittee SC 27, Security techniques.

Page 12, Subclause A.8.1.1

Replace

Control

Assets associated with information and information processing facilities shall be identified and an inventory of
these assets should be drawn up and maintained.

with

Control

Information, other assets associated with information and information processing facilities shall be identified
and an inventory of these assets shall be drawn up and maintained.

© ISO 2014– All rights reserved 2 1


INTERNATIONAL ORGANIZATION FOR STANDARDIZATION  МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ  ORGANISATION INTERNATIONALE DE NORMALISATION
INTERNATIONAL ELECTROTECHNICAL COMMISSION  МЕЖДУНАРОДНАЯ ЭЛЕКТРОТЕХНИЧЕСКАЯ КОМИССИЯ  COMMISSION ÉLECTROTECHNIQUE INTERNATIONALE

Information technology — Security techniques — Information


security management systems — Requirements
TECHNICAL CORRIGENDUM 2

Technologies de l'information — Techniques de sécurité — Systèmes de management de la sécurité de


l'information — Exigences

RECTIFICATIF TECHNIQUE 2

Technical Corrigendum 1 to ISO/IEC 27001:2013 was prepared by Joint Technical Committee ISO/IEC
JTC 1, Information technology, Subcommittee SC 27, IT Security techniques

ICS 35.040 Ref. No. ISO/IEC 27001:2013/Cor.2:2015(E)

© ISO/IEC 2015 – All rights reserved

Published in Switzerland

3
ISO/IEC 27001:2013/Cor.2:2015(E)

Page 4, Subclause 6.1.3

Replace

Control

d) produce a Statement of Applicability that contains the necessary controls (see 6.1.3 b) and c)) and
justification for inclusions, whether they are implemented or not, and the justification for exclusions of
controls from Annex A;

with

Control

d) produce a Statement of Applicability that contains:


 the necessary controls (see 6.1.3 b) and c));

 justification for their inclusion;

 whether the necessary controls are implemented or not; and

 the justification for excluding any of the Annex A controls.

(LITD 17)
2 © Unit,
Publication ISO/IEC
BIS,2015
New–Delhi,
All rights
Indiareserved

You might also like