Skip to Main Content
Receive around-the-clock support, as and when you need it with our 24/7 Emergency Cyber Incident Response Service | Find out more
ISO/IEC 27036-2:2014

ISO/IEC 27036-2 2014 (ISO 27036-2 Standard) – Requirements for supplier information security

SKU: 4775
Authors: ISO/IEC
Publishers: ISO/IEC
Format: Hardcopy
Published: 01 Aug 2016
Availability: In Stock

The ISO 27036-2 standard specifies information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships. These requirements are suitable for all organisations, regardless of their type, size and nature.

ISO 27036-2 should be used in conjunction with ISO 27036-1.

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account.  Apply online today or call our service centre team on 00 800 48 484 484.

Options:
Price: 235,00 €

Description

ISO/IEC 27036-2:2014 – Information technology – Security techniques – Information security for supplier relationships – Part 2: Requirements

Most organisations have relationships with suppliers that involve the transfer of information: suppliers can have direct or indirect access to acquirers' information and information systems, and acquirers can have access to suppliers' information.

Acquirers and suppliers can therefore present information security risks to each other. These risks should be managed by both parties.

The ISO/IEC 27036-2 standard specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships.

These requirements cover any procurement and supply of products and services, such as manufacturing or assembly, business process procurement, software and hardware components, knowledge process procurement, build-operate-transfer and Cloud computing services, and are applicable to all organisations – whether supplier or acquirer – regardless of their type, size and nature.

To meet these requirements, an organisation should already have internally implemented a number of foundational processes, or be actively planning to do so. These processes include, but are not limited to, governance, business management, risk management, operational and human resources management, and information security.

Customer Reviews

top
This website uses cookies. View our cookie policy.
SUBSCRIBE TO OUR
NEWSLETTER
Loading...