Connect with us

Hi, what are you looking for?

ISO 27001

The article covers Cryptographic controls, Policy on the Utilization of Cryptographic Controls & Key Management. A.10.1 Cryptographic controls The purpose is to ensure effective...

ISO 27001

The required activity Clause 4.3 ISO 27001 Guidelines for Implementation To determine the scope of the ISMS (information security management system), the organization determines...

Compliance

The task to be performed ISO 27001 Clause 10.1 Nonconformity and corrective action, Clause 10 which includes sections 10.1 and 10.2 covers the “Act”...

Governance

ISO/IEC 27557 — Information technology — Organizational privacy risk management [Draft] Introduction In this standard, organizations will receive guidance on managing privacy risks (risks...

Cyber Security

ISO/IEC TS 27110:2021 — Information security, cybersecurity and privacy protection — Cybersecurity framework development instructions Introduction As a Technical Specification, the standard (an architecture...

Information Security

ISO/IEC 27040:2015 – Information technology — Security techniques — Storage security Introduction The standard’s proponents assert that information security has not been adequately addressed...

Standards

ISO 27k consists of more than 70 standards, 50 of which have been published thus far: 1. ISO/IEC 27000:2018 is an overview and an...

Regulation

ISO/IEC 27011:2016 – Information technology – Security protocols – Information security guidelines based on ISO/IEC 27002 for telecom companies Introduction ITU-T and ISO/IEC JTC1/SC27...

Regulation

ISO/IEC 27014:2020 – Cybersecurity, information security, and privacy protection – Information security governance Introduction In collaboration with the ITU Telecommunication Standardization Sector (ITU-T), ISO/IEC...

Regulation

ISO/IEC 27010:2015 – Information technology – Security techniques – Information security management for inter-sectoral and inter-organizational communications (2nd edition)  Introduction The purpose of this...

Regulation

ISO 27799:2016 — Health informatics — Information security management in health using ISO/IEC 27002 (2nd edition) Introduction This standard provides guidance on information security...

ISO 27001

A.8.1 Responsibility for Assets ISO 27001 Annex: A.8 Asset Management – Identifying and establishing acceptable security responsibilities for the organization’s assets is its objective....

More Posts
Advertisement Advertisement
  • solutions-inc
  • solutions-inc
  • solutions-inc
  • solutions-inc
Advertisement Advertisement
  • solutions-inc
  • solutions-inc
  • solutions-inc
  • solutions-inc