SPRING DISCOUNT
Get 30% off on toolkits, course exams, and Conformio yearly plans.
Limited-time offer – ends April 25, 2024
Use promo code:
SPRING30

ISO 27001 & 22301 - Expert Advice Community

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • Server hardening and ISO 27001

    For ISO standards does the standard require 100% conformity with environment hardening or rather does ISO review the process the organization uses to ensure server environment hardening?
  • Best practice to communicate

    Is there a best practice method to communicate the information security policy to external interested parties, as well as document said communication?
  • Who is accountable and responsible for applications and for the operating system

    There is Windows Server 2008 and a few applications are working on that server for different business purposes of different business units. In this case who is accountable and responsible for these applications and for the operating system (Windows 2008)? Is it possible that the same organizational unit ( for example IT) at the same time to be accountable and responsible for asset (for example Windows 2008)? If yes then how to organize the change management process for the operating system?
  • Implementing ISMS for systems with different cyber security risks

    We need to implement ISMS for both our business office systems & operational systems. For the operational systems we have a greater risk for Cyber Security. How do we have to implement ISMS for this, and what will be the difference or main focal point for cyber security?
  • ISO 27001 for an University

    Is 27001 sufficient to cover all security related concerns of an Examination Cell of a University ? Are there any more standards relevant/useful for such a scenario?
  • ISMS scope for a cloud provider

    My company is a cloud provider with Infrastructure as a service (IaaS) model. In simple terms we rent servers, networks and security appliances to our customers. We keep the hardware and underlying infrastructure running, and our customers upload their data to the servers and control who has access to it.
  • Training and awareness statements in the Information security policy

    In your information security policy template what do these two statements mean and how are they different?
  • Alternative options for treating unacceptable risks

    In the case of simple Risk assessment where Risk Score is computed by adding impact and likelihood, it may happen that (implemented or to-be-implemented) controls reduce the likelihood but not the impact. If the Risk score is above the acceptable level of risk, what actions could be taken please other than accepting the risk?
  • Monitoring and reporting for security metric?

    Can you explain what is monitoring and reporting for security metric?
  • Questions about ISO 22301/BS 25999 Toolkit

    I have read through the offering for ISO 22301/BS 25999 Toolkit. I have a few questions though.