if you appoints a chairman of your district how do you empliment policy?
SOP for threats and vulnerability assessment
Could you kindly guide from where can I get the SOP (Standard operating procedure) for Threats and Vulnerability Assessment.
Why are some documents mandatory?
Why is 8.1.1 mandantory and 8.2.1 not mandantory? the norm gives me no hints. can you tell me the text parts of the ISO where I can rean the mandantory needs?
Cost of the certification audit; managing ISO documents
1.What is the cost of certification audit?
Identification of risks caused by third parties
Which are the most common risks in outsourced data center?
Internal/external issues
1) what are the internal issues that could influence your information security ?
2) what are the external issues hat could influence your information security ?
3) Do we need to document these issues once found ?
procedure for Identification of Requirements
Hello
I have gone through the procedure for Identification of Requirements document of Advisera and I have following four queries in my mind. Please help me in it.
1) What is the process of identification of interested parties, as well as legal, regulatory, contractual and other requirements related to ISMS ?
2) Who is usually responsible for identifying such requirements ?
3) Could you elaborate what sort of requirements with the help of an example ?
4) who is responsible for evaluating the compliance of ISMS with relevant legal, regulatory and contractual requirements ?
Relationship between ISO 27001:2013 and ISO 27003
Would you please guide me what is the Relationship between ISO 27003 and ISO 27001:2013 Implementation ?
How to define scope of ISO 27001 for software development company
How to Define scope of ISO 27001 for software development company