1. (2022) ISO/IEC 27001: Information security, cybersecurity and privacy protection — Information security management systems — Requirements. URL: https://www.iso.org/standard/82875.html (Accessed: 15 March 2024).
2. (2013) ISO/IEC 27001: Information Technology — Security Techniques — Information Security Management Systems — Requirements. URL: https://www.iso.org/standard/54534.html (Accessed: 15 March 2024).
3. Susukailo V., Opirsky I., Yaremko O. (2022) Methodology of ISMS Establishment Against Modern Cybersecurity Threats. In: Klymash M., Beshley M., Luntovskyy A. (eds) Future Intent-Based Networking. Lecture Notes in Electrical Engineering, vol 831. Springer, Cham. DOI: 10.1007/978-3-030-92435-5_15.
4. Kurii Y. Opirskyy, I. (2021). Analysis and Comparison of the NIST SP 800-53 and ISO/IEC 27001:2013. Paper presented at the CEUR Workshop Proceedings, 3288, 21-32.
5. (2022) ISO/IEC 27002: Information security, cybersecurity and privacy protection - Information security controls. URL: https://www.iso.org/standard/75652.html (Accessed: 15 March 2024).