{"id":1107,"date":"2025-07-14T14:54:17","date_gmt":"2025-07-14T10:54:17","guid":{"rendered":"https:\/\/cyberforensics.az\/?page_id=1107"},"modified":"2025-07-15T02:12:29","modified_gmt":"2025-07-14T22:12:29","slug":"iso-iec-27001-isms-information-security","status":"publish","type":"page","link":"https:\/\/cyberforensics.az\/az\/iso-iec-27001-isms-information-security\/","title":{"rendered":"ISO\/IEC 27001 ISMS (\u0130nformasiya T\u0259hl\u00fck\u0259sizliyi)"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1107\" class=\"elementor elementor-1107\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-136673d7 e-flex e-con-boxed e-con e-parent\" data-id=\"136673d7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e052248 e-flex e-con-boxed e-con e-parent\" data-id=\"1e052248\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e18423a elementor-widget elementor-widget-spacer\" data-id=\"2e18423a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-41c9ee1d e-flex e-con-boxed e-con e-parent\" data-id=\"41c9ee1d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-176ca7 e-flex e-con-boxed e-con e-parent\" data-id=\"176ca7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed07353 elementor-widget elementor-widget-text-editor\" data-id=\"ed07353\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2>ISO\/IEC 27001 n\u0259dir?<\/h2><p>ISO\/IEC 27001 d\u00fcnyan\u0131n \u0259n m\u0259\u015fhur standart\u0131d\u0131r <strong>\u0130nformasiya T\u0259hl\u00fck\u0259sizliyi \u0130dar\u0259etm\u0259 Sisteml\u0259ri (ISMS)<\/strong>. O, \u0130BS-nin cavab verm\u0259li oldu\u011fu t\u0259l\u0259bl\u0259ri m\u00fc\u0259yy\u0259n edir.<\/p><p>ISO\/IEC 27001 standart\u0131 ist\u0259nil\u0259n \u00f6l\u00e7\u00fcd\u0259 v\u0259 b\u00fct\u00fcn f\u0259aliyy\u0259t sektorlar\u0131ndan \u015firk\u0259tl\u0259r\u0259 informasiya t\u0259hl\u00fck\u0259sizliyi idar\u0259etm\u0259 sisteminin yarad\u0131lmas\u0131, t\u0259tbiqi, saxlanmas\u0131 v\u0259 davaml\u0131 olaraq t\u0259kmill\u0259\u015fdirilm\u0259si \u00fc\u00e7\u00fcn t\u0259limatlar t\u0259qdim edir.<\/p><p>ISO\/IEC 27001-\u0259 uy\u011funluq o dem\u0259kdir ki, t\u0259\u015fkilat v\u0259 ya m\u00fc\u0259ssis\u0259 \u015firk\u0259t\u0259 m\u0259xsus olan v\u0259 ya idar\u0259 olunan m\u0259lumatlar\u0131n t\u0259hl\u00fck\u0259sizliyi il\u0259 ba\u011fl\u0131 riskl\u0259ri idar\u0259 etm\u0259k \u00fc\u00e7\u00fcn sistem t\u0259tbiq edib v\u0259 bu sistem bu Beyn\u0259lxalq Standartda t\u0259sbit edilmi\u015f b\u00fct\u00fcn \u0259n yax\u015f\u0131 t\u0259cr\u00fcb\u0259 v\u0259 prinsipl\u0259r\u0259 h\u00f6rm\u0259t edir.<\/p><h2>ISO\/IEC 27001 n\u0259 \u00fc\u00e7\u00fcn vacibdir?<\/h2><p>Kibercinay\u0259tkarl\u0131\u011f\u0131n artmas\u0131 il\u0259 v\u0259 <strong>yeni t\u0259hl\u00fck\u0259l\u0259r<\/strong> <strong>daim ortaya \u00e7\u0131x\u0131r<\/strong>, kiber riskl\u0259ri idar\u0259 etm\u0259k \u00e7\u0259tin v\u0259 ya qeyri-m\u00fcmk\u00fcn g\u00f6r\u00fcn\u0259 bil\u0259r. ISO\/IEC 27001 t\u0259\u015fkilatlara riskd\u0259n x\u0259b\u0259rdar olma\u011fa v\u0259 z\u0259if t\u0259r\u0259fl\u0259ri aktiv \u015f\u0259kild\u0259 m\u00fc\u0259yy\u0259n etm\u0259y\u0259 v\u0259 aradan qald\u0131rma\u011fa k\u00f6m\u0259k edir.<\/p><p>ISO\/IEC 27001 informasiya t\u0259hl\u00fck\u0259sizliyin\u0259 vahid yana\u015fman\u0131 t\u0259\u015fviq edir: insanlar\u0131n, siyas\u0259tl\u0259rin v\u0259 texnologiyan\u0131n yoxlan\u0131lmas\u0131. Bu standarta uy\u011fun olaraq h\u0259yata ke\u00e7iril\u0259n informasiya t\u0259hl\u00fck\u0259sizliyi idar\u0259etm\u0259 sistemi bir vasit\u0259dir <strong>riskl\u0259rin idar\u0259 edilm\u0259si, kiber davaml\u0131l\u0131q <\/strong>v\u0259<strong> \u0259m\u0259liyyat m\u00fck\u0259mm\u0259lliyi.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ff4066a e-flex e-con-boxed e-con e-parent\" data-id=\"1ff4066a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ce00703 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"1ce00703\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\" role=\"navigation\" aria-label=\"Post Navigation\">\r\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/az\/hitrust\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-left\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">\u018fvv\u0259lki<\/span><span class=\"post-navigation__prev--title\">HITRUST\u00ae<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\r\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/az\/pci-dss-compliance\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">Sonrak\u0131<\/span><span class=\"post-navigation__next--title\">PCI DSS Uy\u011funlu\u011fu<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Sonrak\u0131<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>ISO\/IEC 27001:2022 What is ISO\/IEC 27001? ISO\/IEC 27001 is\u00a0the world&#8217;s best-known standard for information security management systems (ISMS). It defines requirements an ISMS must meet. The ISO\/IEC 27001 standard provides companies of any size and from all sectors of activity with guidance for establishing, implementing, maintaining and continually improving an information security management system. Conformity [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1107","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/pages\/1107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/comments?post=1107"}],"version-history":[{"count":0,"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/pages\/1107\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/media?parent=1107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}