I need your help in what are the standards of ISO security?? I mean for example if you want to do security to your computer..one of thing you will do assign for a strong password... My question is ..what is the reference in ISO....How i got that reference
Scale of BIA to determine RTOs and RPOs
I have question regarding the scale of BIA to determine RTOs and RPOs:
Aspects in A 14.2.5
Secure system engineering principles)Can you help me to understand some aspects in the A 14.2.5 of ISO 27002:2013
1. Does the mentioned clause refer to just software development or to the large information system design?
2. What are the main aspects of the clause and how the organization should implement the requirements of this chapter?
3. How the implementation of above mentioned clause can be checked by an auditor and what will be the evidence of implementation of requirements?
Thanks,
Aram Arekhtsyan
IT Security Specialist
Seguridad de la Informacion en la Gestion de proyectos
Tengo una inquietud, frente al control nuevo de esta norma : 6.1.5. Seguridad de la Información en la Gestión de Proyectos.
Impact in the ISO 27001
1. When we say impact of a threat do we mean the impact on the user of the asset or the organization?
Information classification
We have an ongoing discussion at the work place about the difference between 2 classifications : CUG: closed user group and confidential.
Page policy document on context of the organization
I am trying to write a page policy document on context of the organisation to add in main ISMS manual. Please could you help me with some example templates and description what to write and how?