Connect with us

Hi, what are you looking for?

ISO 27001

The article covers Cryptographic controls, Policy on the Utilization of Cryptographic Controls & Key Management. A.10.1 Cryptographic controls The purpose is to ensure effective...

Governance

Understanding the organization and its context The required activity A knowledge security management system (ISMS) is a system for assessing external and internal issues...

Governance

Required activity ISO 27001 Implementation Guideline Clause 5.2 Policy, a security policy is to be developed by the top management. An explanation Documented information...

ISO 27001

ISO 27001 Implementation Guideline Clause 5.1 deals with leadership and commitment. The required activity About the implementation for top management, it demonstrates commitment and...

Governance

Required activity Knowledge security performance is analyzed by the organization to determine how effective its ISMS is. Guidelines for Implementation Monitoring and measuring data...

ISO 27001

The required activity Clause 4.3 ISO 27001 Guidelines for Implementation To determine the scope of the ISMS (information security management system), the organization determines...

Compliance

Compliance

The article discusses Compliance with Legal and Contractual Requirements, Identification of Applicable Legislation and Contractual Requirements and Intellectual Property Rights accordingly controls.A.18.1 Compliance with...

Compliance

The task to be performed ISO 27001 Clause 10.1 Nonconformity and corrective action, Clause 10 which includes sections 10.1 and 10.2 covers the “Act”...

Compliance

ISO/IEC 27034:2011+ – Information technology – Security techniques – Application security (all published except part 4) Introduction Business and IT managers, developers and auditors,...

Compliance

ISO/IEC 27555 — Information security, cybersecurity and privacy protection — Rules on personally identifiable information deletion [Draft] Introduction The standard will help companies to...

Cyber Security

Information Security

The purpose of this article is to explain ISO 27001 Annex: A.14.2.3 Technical Review of Applications after Operating Platform Changes, A.14.2.4 Restrictions on Changes...

Governance

Information Security

6.1 Internal Organization This document aims to create a management framework for initiating and managing IT security efforts within the organization. 6.1.1 Information Security...

Governance

ISO/IEC 27557 — Information technology — Organizational privacy risk management [Draft] Introduction In this standard, organizations will receive guidance on managing privacy risks (risks...

Cyber Security

ISO/IEC 27033:2010+ – Information technology – Security techniques – Network security (7 parts, 6 published, 1 DRAFT) Introduction ISO/IEC 27033 is a multi-part standard...

Information Security

Cyber Security

This program is aimed at preventing unauthorized access to systems and applications. A.9.4.1 Information Access Restriction Control– Clearly defining access controls to information and...

Information Security

6.1 Internal Organization This document aims to create a management framework for initiating and managing IT security efforts within the organization. 6.1.1 Information Security...

Governance

ISO/IEC 27557 — Information technology — Organizational privacy risk management [Draft] Introduction In this standard, organizations will receive guidance on managing privacy risks (risks...

Cyber Security

ISO/IEC 27554 — Information technology — Security techniques — Application of ISO 31000 for assessment of identity management-related risk [Draft] Introduction To facilitate the...

Information Privacy

Cyber Security

This program is aimed at preventing unauthorized access to systems and applications. A.9.4.1 Information Access Restriction Control– Clearly defining access controls to information and...

Information Privacy

Information Privacy

Information Privacy

Cyber Security

Standards

ISO/IEC 27021:2017 – Information technology — Security techniques — Competence requirements for information security management systems professionals Introduction This standard aims to establish a...

Regulation

ISO/IEC 27011:2016 – Information technology – Security protocols – Information security guidelines based on ISO/IEC 27002 for telecom companies Introduction ITU-T and ISO/IEC JTC1/SC27...

Governance

ISO/IEC 27013:2015 – Information technology – Security techniques – Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 (2nd edition) Introduction In...

Regulation

ISO/IEC 27014:2020 – Cybersecurity, information security, and privacy protection – Information security governance Introduction In collaboration with the ITU Telecommunication Standardization Sector (ITU-T), ISO/IEC...

Governance

ISO/IEC 27017:2015 / ITU-T X.1631 – Information technology — Security techniques — Recommended practices for information security controls based on ISO/IEC 27002 applicable to...

Standards

ISO/IEC 27018:2019 – Information technology — Security techniques — Guidelines for protecting Personally Identifiable Information (PII) in public cloud servers acting as PII processors...

Regulation

ISO/IEC 27010:2015 – Information technology – Security techniques – Information security management for inter-sectoral and inter-organizational communications (2nd edition)  Introduction The purpose of this...

Compliance

ISO/IEC 27009:2020 – Information technology – Information security – Application of ISO/IEC 27001 to specific sectors – Requirements (2nd edition) Introduction This standard aims...

Information Privacy

ISO/IEC 27007:2020 – Privacy protection, information security, and cybersecurity – Guidelines for information security management systems auditing (3rd edition) Introduction ISO/IEC 27007 is intended...

Governance

ISO/IEC 27019:2017 – Information technology – Security techniques – Information security controls applied to the energy industry (2nd edition) Introduction Organizations in “the energy...

Cyber Security

ISO/IEC 27006:2015 – Information technology – Security techniques – Requirements for bodies providing audit and certification of information security management systems (3rd edition) Part...

Standards

ISO/IEC 27005:2018 – Information technology – Security techniques – Information security risk management (3rd edition) Introduction As a result, ISO27k standards encourage organizations to...

More Posts
Advertisement Advertisement
  • solutions-inc
  • solutions-inc
  • solutions-inc
  • solutions-inc
Advertisement Advertisement
  • solutions-inc
  • solutions-inc
  • solutions-inc
  • solutions-inc

ISO 27001

ISO 27001

Required Activity ISO 27001 Clause 10.2 Continual Improvement, An organization maintains its ISMS continuously to ensure that it is fit for purpose, adequately comprehensive,...

ISO 27001

Activity ISO 27001 Clause 9.3 Management review, Top Management carries out management reviews for ISO 27001 on a scheduled basis. What is ISO 27001...

Compliance

ISO 27001 Annex: A.11 Physical and Environmental Security discusses Secure areas, Physical Security Perimeter and Physical Entry Controls. A.11.1 Secure areas In addition to...