{"id":515069,"date":"2024-11-05T14:33:15","date_gmt":"2024-11-05T14:33:15","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/can-csa-iso-iec-2700418\/"},"modified":"2024-11-05T14:33:15","modified_gmt":"2024-11-05T14:33:15","slug":"can-csa-iso-iec-2700418","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/csa\/can-csa-iso-iec-2700418\/","title":{"rendered":"CAN\/CSA-ISO\/IEC 27004:18"},"content":{"rendered":"

Preface<\/strong><\/p>\n

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO\/IEC Joint Technical Committee 1 on Information Technology (ISO\/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). <\/p>\n

For brevity, this Standard will be referred to as CAN\/CSA-ISO\/IEC 27004 throughout. <\/p>\n

This Standard supersedes CAN\/CSA-ISO\/IEC 27004:10 (adopted ISO\/IEC 27004:2009). <\/p>\n

Scope<\/strong><\/p>\n

This document provides guidelines intended to assist organizations in evaluating the information security performance and the effectiveness of an information security management system in order to fulfil the requirements of ISO\/IEC 27001:2013, 9.1. It establishes: <\/p>\n

a) the monitoring and measurement of information security performance;
b) the monitoring and measurement of the effectiveness of an information security management system (ISMS) including its processes and controls;
c) the analysis and evaluation of the results of monitoring and measurement. <\/p>\n

This document is applicable to all types and sizes of organizations.<\/p>\n","protected":false},"excerpt":{"rendered":"

Information technology \u2014 Security techniques \u2014 Information security management \u2014 Monitoring, measurement, analysis and evaluation<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
CSA<\/b><\/a><\/td>\n2018-01-01<\/td>\n75<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":515081,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[91,656,2674],"product_tag":[],"class_list":{"0":"post-515069","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-03-100-70","7":"product_cat-35-030","8":"product_cat-csa","10":"first","11":"instock","12":"sold-individually","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/515069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/515081"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=515069"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=515069"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=515069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}