Guest
I was just curious if either ISO 27001 and/or NIST controls specify the frequency for which (network and/or application) penetration testing should be performed?
1. I am having trouble finding out how these two documents are connected (are both needed?) 11.A.8.1_Inventory_of_Assets_Integrated 07.1_Appendix_1_Risk_Assessment_Table_Integrated In inventory of assets.
2. How do we know how to assess "Impact/Consequences"? What do we base that rating on?
3. And how do we transfer that rating to the Risk Assessment table
The issue is that not all employees have been granted a company-sanctioned device for accessing our office’s network. Policy-wise we have restricted them to only using RDP and that they must have anti-virus software on the machine they’re using to access our network, however, I feel this is not enough. I do not have as much experience in this area as others may have, so I’d like to know how do other companies deal with such a thing? Can we force our employees using their own devices to install an MDM software provided by the company so that we have some control over what’s connecting to our network? Is that the best route or will backlash/pushback from the employees being forced to install something they may deem intrusive actually work against us in this process? What about employees accessing our email system (office 365) on their personal phones – should we extend MDM and controls to those devices as well? Can/should we define a list of acceptable phones/operating systems to be used in our BYOD policy?
Any insight you could provide here would be greatly appreciated. In a perfect world, I would issue each employee a company-owned laptop/phone to deal with this situation, however, we just do not have the budget to go that route.
¿Que aspectos importantes de la norma ISO 27001 puedo incluir para la seguridad lógica en una empresa en la cual laboro?
I'm working for a university project, the subject is to price the security of a company whose main business is to give advice on cybersecurity. This company is located in 6 different nation (XYZ) with a total of 740 employees with the HQ in XYZ. I m aware that ISO 27001 is a main criteria today for a company because it can provide you some guidelines on what to protect and allows you to gain the audience thanks to the certification. But my main concern is to understand how to implement it?
Where should I start with this certification, I mean I have a budget of XYZ USD and the main focus should be the protection of the confidential data. By seeking information on internet I can not gather enough information on the budget that I should enable for the company.
I got IT security Premium template. I don't understand a part what should I write in it.
Connecting to communication networks and data exchange must reflect the sensitivity of data and is performed [specify how this is technically implemented, or make reference to a document defining the process] this point in the A8.2 IT-Security Policies.
I would like to know what it is about exactly. What should I describe there?
1. I purchased your Risk Assessment Table and Risk Treatment Table. I have completed this phase of the planning for our ISO Certification. Now, once I have filled out the excel Spreadsheets does that count as my "Risk Report" for purposes of satisfying the mandatory document for Certification audit?
My next step is the SOA correct?
2. What course do you recommend so I can be prepared to do an internal audit and improvement for the ISMS for my company?
We did the certification audit last year on one function (customer support) and got the 3-year certificate. Since then we bought a company and would like to expand the scope to include the new company and also additional functions across both functions. do we need to 'start over' and recertify or is it possible to do the surveillance audit for year 2?