For ISO standards does the standard require 100% conformity with environment hardening or rather does ISO review the process the organization uses to ensure server environment hardening?
Best practice to communicate
Is there a best practice method to communicate the information security policy to external interested parties, as well as document said communication?
Who is accountable and responsible for applications and for the operating system
There is Windows Server 2008 and a few applications are working on that server for different business purposes of different business units. In this case who is accountable and responsible for these applications and for the operating system (Windows 2008)? Is it possible that the same organizational unit ( for example IT) at the same time to be accountable and responsible for asset (for example Windows 2008)? If yes then how to organize the change management process for the operating system?
Implementing ISMS for systems with different cyber security risks
We need to implement ISMS for both our business office systems & operational systems. For the operational systems we have a greater risk for Cyber Security. How do we have to implement ISMS for this, and what will be the difference or main focal point for cyber security?
ISO 27001 for an University
Is 27001 sufficient to cover all security related concerns of an Examination Cell of a University ? Are there any more standards relevant/useful for such a scenario?
ISMS scope for a cloud provider
My company is a cloud provider with Infrastructure as a service (IaaS) model. In simple terms we rent servers, networks and security appliances to our customers. We keep the hardware and underlying infrastructure running, and our customers upload their data to the servers and control who has access to it.
Training and awareness statements in the Information security policy
In your information security policy template what do these two statements mean and how are they different?
Alternative options for treating unacceptable risks
In the case of simple Risk assessment where Risk Score is computed by adding impact and likelihood, it may happen that (implemented or to-be-implemented) controls reduce the likelihood but not the impact. If the Risk score is above the acceptable level of risk, what actions could be taken please other than accepting the risk?
Monitoring and reporting for security metric?
Can you explain what is monitoring and reporting for security metric?
Questions about ISO 22301/BS 25999 Toolkit
I have read through the offering for ISO 22301/BS 25999 Toolkit. I have a few questions though.