ISO IEC 27033-2-2012 PDF
Name in English:
St ISO IEC 27033-2-2012
Name in Russian:
Ст ISO IEC 27033-2-2012
Original standard ISO IEC 27033-2-2012 in PDF full version. Additional info + preview on request
Full title and description
ISO/IEC 27033-2:2012 — Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security. This part of the ISO/IEC 27033 series provides guidance to organisations for planning, designing, implementing and documenting network security architectures and implementations.
Abstract
ISO/IEC 27033-2:2012 gives practical guidance to help organisations produce quality network technical security architectures, designs and implementations appropriate to their business environment. It focuses on a consistent approach to planning, design and implementation of network security and on documenting the chosen architecture and controls.
General information
- Status: Published (international standard).
- Publication date: First published July 27, 2012 (catalogued by ISO as August 2012 — Edition 1, 2012).
- Publisher: ISO/IEC (developed under ISO/IEC JTC 1/SC 27 — Information security, cybersecurity and privacy protection).
- ICS / categories: 35.030 (IT security).
- Edition / version: Edition 1 (2012).
- Number of pages: 28 pages (official publication length).
Scope
This part of ISO/IEC 27033 covers guidance for planning, designing, implementing and documenting network security for organisations. It defines principles for creating end-to-end network security architectures that can be applied across different network types and technologies, and it supports the selection and documentation of technical security controls consistent with organisational risk and business requirements.
Key topics and requirements
- Framework and approach for planning and documenting a network security architecture (end-to-end perspective).
- Guidance on translating business and risk requirements into technical network security design decisions.
- Design considerations for segmentation, boundary protection and secure communication paths.
- Selection and justification of technical controls and gateways (including how to integrate with VPN, gateway and wireless controls addressed in other parts of the series).
- Implementation and operational considerations: monitoring, logging, change control and secure management of network devices.
- Requirements for documenting designs and decisions so they can be reviewed, audited and maintained.
Typical use and users
Used by network/security architects, security engineers, IT managers, system integrators, security consultants and auditors. Typical uses include creating or reviewing network security designs, selecting technical controls, defining segmentation/boundary protections, and producing documentation to support implementation and audits. Organisations with complex multi-network or hybrid environments (on-premises, cloud, remote access) will find the guidance particularly relevant.
Related standards
ISO/IEC 27033-2 is part of the multi-part ISO/IEC 27033 series (network security). Related documents include ISO/IEC 27033-1 (overview and concepts), ISO/IEC 27033-3 (reference networking scenarios and threats), ISO/IEC 27033-4 (security gateways), ISO/IEC 27033-5 (VPNs) and ISO/IEC 27033-6 (wireless IP network access). It is also used alongside the ISO/IEC 27000/27001/27002 family (information security management and controls). ISO/IEC 27033-2 replaced earlier material from ISO/IEC 18028-2:2006.
Keywords
Network security, network architecture, security design, segmentation, boundary protection, security gateways, VPN, wireless network security, technical controls, documentation, ISO/IEC 27033.
FAQ
Q: What is this standard?
A: ISO/IEC 27033-2:2012 is an international standard giving guidelines for the design and implementation of network security architectures and technical controls.
Q: What does it cover?
A: It covers a structured approach to planning, designing, implementing and documenting network security — including end-to-end architecture considerations, control selection rationale, segmentation and operational considerations for secure networks. It does not replace technology‑specific guidance found in other parts of the 27033 series (e.g., VPNs, gateways, wireless).
Q: Who typically uses it?
A: Network and security architects, security engineers, IT managers, integrators, consultants and auditors use it when creating, evaluating or documenting technical network security architectures and implementations.
Q: Is it current or superseded?
A: The document was published in 2012 (Edition 1) and is published as an active ISO standard. ISO records show the 2012 edition remains the published version; ISO carried out reviews after publication (the standard was reviewed/confirmed in follow-up reviews). Users should check their national adoption or subsequent revisions of the 27033 series for the latest related parts.
Q: Is it part of a series?
A: Yes — it is Part 2 of the ISO/IEC 27033 series on network security. Other parts provide overview/concepts, reference scenarios, and technology‑specific guidance (security gateways, VPNs, wireless, etc.).
Q: What are the key keywords?
A: Network security, security architecture, design guidance, technical controls, segmentation, boundary protection, documentation, ISO/IEC 27033.