![INCITS/ISO/IEC 27001:2013/COR 1:2014 (2019) - Information technology Security techniques Information security management systems Requirements - Technical Corrigendum 1 INCITS/ISO/IEC 27001:2013/COR 1:2014 (2019) - Information technology Security techniques Information security management systems Requirements - Technical Corrigendum 1](https://webstore.ansi.org/cover-pages/small/INCITS/INCITS+ISO+IEC+27001+2013+COR+1+2014+(2019).jpg)
INCITS/ISO/IEC 27001:2013/COR 1:2014 (2019) - Information technology Security techniques Information security management systems Requirements - Technical Corrigendum 1
![PDF] An Approach to Map COBIT Processes to ISO/IEC 27001 Information Security Management Controls | Semantic Scholar PDF] An Approach to Map COBIT Processes to ISO/IEC 27001 Information Security Management Controls | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/4d69c7653470b94e6a0818f92eb9e706e82b5608/10-Table2-1.png)
PDF] An Approach to Map COBIT Processes to ISO/IEC 27001 Information Security Management Controls | Semantic Scholar
![ISO/IEC 27001:2013 - Information technology - Security techniques - Information security management systems - Requirements ISO/IEC 27001:2013 - Information technology - Security techniques - Information security management systems - Requirements](https://webstore.ansi.org/cover-pages/small/ISO/ISO+IEC+27001-2013.jpg)