GSO ISO/IEC TR 27015:2015

ISO/IEC TR 27015:2012
Gulf Standard   Current Edition · Approved on 09 April 2015

Information technology - Security techniques – Information security management guidelines for financial services

GSO ISO/IEC TR 27015:2015 Files

English 18 Pages
Current Edition Reference Language
USD 123.13

GSO ISO/IEC TR 27015:2015 Scope

This Technical Report provides information security guidance complementing and in addition to information security controls defined in ISO/IEC 27002:2005 for initiating, implementing, maintaining, and improving information security within organizations providing financial services.

Best Sellers From Information Sector

GSO ISO/TR 18492:2017
ISO/TR 18492:2005 
Gulf Standard
Long-term preservation of electronic document-based information
GSO ISO/TS 23635:2024
ISO/TS 23635:2022 
Gulf Standard
Blockchain and distributed ledger technologies — Guidelines for governance
GSO ISO/IEC 15773:2013
ISO/IEC 15773:1998 
Gulf Standard
Information technology -- Telecommunications and information exchange between systems -- Broadband Private Integrated Services Network -- Inter-exchange signalling protocol -- Transit counter additional network feature
GSO ISO 11238:2017
ISO 11238:2012 
Gulf Standard
Health informatics -- Identification of medicinal products -- Data elements and structures for the unique identification and exchange of regulated information on substances

Recently Published from Information Sector

GSO ISO/IEC 19770-6:2025
ISO/IEC 19770-6:2024 
Gulf Standard
Information technology — IT asset management — Part 6: Hardware identification tag
GSO ISO 18128:2025
ISO 18128:2024 
Gulf Standard
Information and documentation — Records risks — Risk assessment for records management
GSO ISO/IEC TR 5891:2025
ISO/IEC TR 5891:2024 
Gulf Standard
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hardware security assessment
GSO ISO/IEC 30137-1:2025
ISO/IEC 30137-1:2024 
Gulf Standard
Information technology — Use of biometrics in video surveillance systems — Part 1: System design and specification