I want to verify in what part of the ISO compliance that will require a company to do 3rd party scanning for vulnerability assessment and penetration testing...
Standard for BCM
1- is there another standard for BCM? or this is THE standard to follow?
Changing template content
I would like to change the Methodology for a risk assesment, so I need to change some properties for columns in the document 07.1_Appendix_1_Risk_Assessment_Table_Integrated_EN, I need to change the formula for a risk calculation and also controls for permitted values for columns Consequence and Likelihood. How can I do this?
Information protection
I have a client who is going to sell information over the Internet and ask me how to prevent that information from being leaked to third parties. What controls do you suggest?
ISO 22301 and NIST 800-34
Need to create a BIA, I was given Nist 800-34 to follow but its confusing, will your templates mirror the NIST 800-34?st
Main control activity
By key control, I mean the main control activity. For eg, in an access provisioning process, the key control activity would be the part where the provisioning actually takes place.
Is ISO 27002 acquisition necessary?
Is it necessary to purchase 27002 standard, or is it’s contents contained completely in Annex A of 270001?
Change management
Please describe about Change management.
Integrated toolkits
We just passed the ISO 9001 and 14001 audit. To be honest, we have 2 critical non-conformities, but this is just plain paperwork to lift it to non critical.