Guest
What are the prerequisites for the implementation of ISO 27001
I have a question to Assets Inventory:
When describing Software, should we go detailed and list every important software which we have, or just list that generally, grouping like in sample excel:
application software (licensed)
freeware; shareware
system software
various tools
databases
With regards to the Asset Name of ICT Equipment Maintenance in the Risk Assessment Table spreadsheet we purchased, should all ICT equipment be broken out individually in the risk assessment table? Or should they be called out in the Controls Document for th ICT equipment?
What is the best way forward to protect data/information both digitally and physically and when used in Artificial Intelligence modeling?
What are the risks for those working on a contracted cloud, such as Google Cloud Platform?
I wanted to know what's the best approach to manage all the servers' application and security event logs. I mean, should we keep the security event logs separate from application logs or we can have them all at one place??
I bought in the past the the Advisera - ISO 27001-EU GDPR templates, but when I started using the Risk_Assessment_Table_27A_EN I found that the catalogue of Threats and Vulnerabilities is not enough and complete to manage a risk assessment in a good way. if there is a more detailed list of Threats and Vulnerabilities ?