-
Isolation of Sensitive Systems
I would like to request for your comment or idea on which I still doubt on how to check this point "Isolation of Sensitive Systems" - According to identified risks, do sensitive application systems operate in an isolated processing environment?
I would very much appreciate for your kindly comment and any idea.
-
ISO 27001 certification for subsidiary companies
Hi, We are considering going for ISO 27001 certification but we have a fully owned subsidiary company in the *** (we are *** based).
1 - Is it possible to certify the two together or is it necessary to seek certification for each one individually?
2 - Similarly would we need a separate ISMS for each?
-
ISO 27001 budgeting
hi! could you help me with budget dividing into CAPEX and OPEX for ISMS (ISO27001) improving?
-
Question about assets for threats
You have made a really neat illustration of the relationship between Assets, Theats, Liabilities and the appropriate Controls which makes it fairly easy to explain the relevant issues. The Asset in question is a Laptop and I am wondering if you may have any other illustrations, either for downloads or to buy?
Looking forward to hearing from you at your earliest convenience.
-
ISO 27001 certification validity change according to address change
address change will change iso 27001 certification validity?
-
A.6.1.5 Information security in project management
My question is, do we have to consider Information security in project management separately. I mean we have already IT Security policy, and other policies, where we described how to work with information securely. Should it also stay in e.g. Project management Handbook? Or may be we can write in Project management Handbook: you have to follow these policies?
Thank you!