Guest
How do perform an ISMS audit with efficient suggestion to consultant and client to ease the gap on the risk and controls in the standard?
I bought the new kit for 27001/2022. I'm missing a document on the new chapter in the documentation
Chapter 6.3 Planned implementation of changes to the ISMS.
When will something be added?
Which document in the toolkit is relevant to clause A.7.5 (Protecting against physical and environmental threats)? And to A.7.8 (Equipment siting and protection)?
What's the distance for a disaster recovery site?
I obtained a certificate through Advisera.
I’m working at a certification body and am gaining experience.
But I understood I need to send my certificate somewhere to become accredited.
Can you please elaborate on that?
I'm interested in applying MS documentation hierarchy according to ISO10013:2001; please address this and in relation to this now being a withdrawn standard.
I would want to know examples of Information Security Objectives which are measurable. I am in the process of coming up with the IS Policy using your template.
Hi! I would like to know whether in ISO 27001 from 2022 there is a statement for logs retention periods regarding critical assets? I would like to know what are the minimum requirements (meaning minimum time periods) for keeping logs containing critical data.
I am working on the ISM Policy and would like to know which other objectives we can put which are measurable besides the generic ones?
Having operating system software and databases that are at the end-of-support life cycle is a serious and ever-present vulnerability in any IT operation. I do not find this vulnerability in Conformio. I then tried to create this vulnerability, but I could not find a suitable Control from the list that is presented for selection. Conformio does not allow me to create a new control. Software and Database maintenance updates would be an appropriate control. This also applies to the vulnerability of using software that is not current. Please advise how I should proceed to create this new vulnerability.