A.12.7.1 Information Systems Audit Controls
Assign topic to the user
1. Does executing the Penetration Tests on the regular basis serves the purpose to be compliant with this Control or do you suggest any other method?
Penetration tests can be used to fulfill control A.12.7.1 Information Systems Audit Controls, provided that they are planned and agreed in a way they minimize risks that can disrupt business operations (e.g., by being performed out of business hours, by covering only part of the most critical systems at a time, etc.).
Another approach would be by performing audits only through the system's logs analysis, system's configurations review, etc.
For further information, see:
- How to use penetration testing for ISO 27001 A.12.6.1 https://advisera.com/27001academy/blog/2016/01/18/how-to-use-penetration-testing-for-iso-27001-a-12-6-1/
2. Do we need to Document a Formal Process of the Penetration test and execute it accordingly?
ISO 27001 does not require the penetration test process to be documented, but the documentation of the process is a good practice to make easier the evaluation of results, and if everything was done as planned.
Comment as guest or Sign in
Apr 29, 2020