![]() Information security is defined as being ‘the preservation of confidentiality, integrity and availability of information’. The standard sets out a code of best practice intended for use by the managers responsible for implementing or maintaining an information security management system. The ISO 27002 standard presents a series of concrete specifications that cover both technical and organisational aspects. universitas semarang, cis controls and sub controls mapping to iso 27001, iso 27001 checklist free pdf amp xls downloads pivot, iso iec 27002. ISO/IEC 27002 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques. I have summarised them in the table of contents for ease of navigation. Let us take a look at the ISO 27001 controls checklist. When you buy a copy of the standard they are all laid out. I like the controls because they are standard controls that are easy to implement. These controls are set out in the ISO 27001 Annex A. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. ISO 27001 has a check list of ISO 27001 controls. Although it sets the objective to be obtained, it does not specify exactly how to go about it. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. The ISO/IEC 27001 standard describes a process approach for the implementation of an ISMS (Information Security Management System). ![]() ISO/IEC 27002 Best Practice for Information Management System In Brief
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |