Page 457

The University of SydneyPage 20ISO/IEC 27000 series–ISO/IEC 27001:2022Information security, cybersecurity and privacy protection --Information security management systems –Requirements–ISO/IEC 27002:2022Information security, cybersecurity and privacy protection -information security controls–ISO/IEC 27003:2017Information technology--Security techniques--Information security management systems –Guidance–ISO/IEC 27004:2016Information security management systems –Monitoring, measurement, analysis and evaluation–ISO/IEC 27005:2021Information security, cybersecurity and privacy protection –Guidance on managing information security risks–ISO/IEC 27006:2015Information technology--Security techniques—Requirements for audit and certification bodies–ISO/IEC 27007:2020Information security, cybersecurity and privacy protection –Guidelines for informationsecurity managementsystems auditing –ISO/IEC 27008:2019Information technology--Security techniques—Guidelines for assessment of security controls–ISO/IEC 27009:2020Information security, cybersecurity and privacy protection –Sector-specific application of ISO/IEC 27001 requirements–ISO/IEC 27010:2015Information technology--Security techniques—ISMS for inter-sector & inter-organizational comms.–ISO/IEC 27011:2016Information technology--Security techniques—ISO/IEC 27002 for telecommunications organizations–ISO/IEC 27013:2021Information security, cybersecurity and privacy protection –Guidance on implantation of ISO/IEC 27001 & 20000-1–ISO/IEC 27014:2020Information security, cybersecurity and privacy protection –Governance of information security––…..and standards for specific sectors, applicability and aspects of Information security–ISO/IEC 27016:2014,ISO/IEC 27017:2015,ISO/IEC 27018:2019,ISO/IEC 27021:2017,ISO/IEC 27031:2011–ISO/IEC 27032:2012,ISO/IEC 27033-1:2015,ISO/IEC 27033-2:2012,ISO/IEC 27033-3:2010,ISO/IEC 27033-4:2014–ISO/IEC 27033-5:2013,ISO/IEC 27033-6:2016,ISO/IEC 27034-1:2011,ISO/IEC 27034-2:2015,…….and so on…