Guest
How to implement more effectively ISO 27001 controls.
I am working on a risk register and wanted to know what could be a list of threats for employees in different departments working on an appraising a project?
Our company is planning to go for ISO 27001 Certification this year. Our company is a SI and supporting, implementing enterprise-level cybersecurity projects to many sectors. As for the scope, we want to define our production network only, contains many critical system/security controls like Firewall, DNS, AD, and many more... Our boss want to say that company's production network is running with ISO 27001 standard. I wonder that that scope is acceptable or not by the auditor.
A.6.1.3: Contact with Authorities: Does it mean contact with the Superior Authority who is also the supreme body for GDPR?
2. A.6.1.4: Contact with Special Interest Groups: Does having ISACA Memberships of some other Interest Groups are taken into consideration?trying to understand the difference between the risk treatment plan and the statement of applicability. Shouldn’t one document show what controls need to be implemented, seems like the purpose is the same.
Hi, is there any list of processes and procedures which are aligned with ISO 27001-13 114 controls?
i mean for example , Access control policy, how many processes and procedures are good enough to be developed for this policy. same is for other domains
does ISO27001 mandate documentation versioning?
I mean like a clear mandate for versions within the document itself, as some sort of version control.