ISO 27001 & 22301 - Expert Advice Community

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • Who should have an OS administrator password?

    Who should have an OS administrator password in a company?
  • Arriving on an SOA

    Hi there, the training materials you do provide gives an awesome walk through on the entire process but I have little doubts left. Can some one explain me in real-time, on what basis and constraints and at what point we arrive on an SOA. Thanks in advance
  • SOA for two sites?

    We are much appreciated your training material as those are very helpful for us, I want an advice from you that we are adding 1 more site (in other city) in our scope for ISMS 27701:2013 audit so do we required another SOA document or we can maintain in already existing document by adding column in it.
  • Asset-based risk assessment

    i have another question i want to know that what is the difference between risk based risk assessment and asset based risk assessment....?
  • Deadline in the List of legal, regulatory, contractual and other requirements

    I have a question about step 02 "02_Procedure_voor_Identificatie_van_Eisen". In that step you must fill in the document "Bijlage_Lijst_van_Wet_Regelgeving_Contractuele_en_Andere_Verplichting en_NL.docx". This document contains a table with five columns. The forth column is "Deadline". I think you must fill in a date in that column, but I don't understand which date is expected here.
  • Server hardening and ISO 27001

    For ISO standards does the standard require 100% conformity with environment hardening or rather does ISO review the process the organization uses to ensure server environment hardening?
  • Best practice to communicate

    Is there a best practice method to communicate the information security policy to external interested parties, as well as document said communication?
  • Who is accountable and responsible for applications and for the operating system

    There is Windows Server 2008 and a few applications are working on that server for different business purposes of different business units. In this case who is accountable and responsible for these applications and for the operating system (Windows 2008)? Is it possible that the same organizational unit ( for example IT) at the same time to be accountable and responsible for asset (for example Windows 2008)? If yes then how to organize the change management process for the operating system?
  • Implementing ISMS for systems with different cyber security risks

    We need to implement ISMS for both our business office systems & operational systems. For the operational systems we have a greater risk for Cyber Security. How do we have to implement ISMS for this, and what will be the difference or main focal point for cyber security?
  • ISO 27001 for an University

    Is 27001 sufficient to cover all security related concerns of an Examination Cell of a University ? Are there any more standards relevant/useful for such a scenario?