Filter posts by category

ISO 27001 Annex A 8.12 Data Leakage Prevention

ISO 27001 Annex A 8.12 Data Leakage Prevention: Certification Body Guide

ISO 27001 Annex A 8.12 Data Leakage Prevention is a preventive control that requires organisations to apply active measures to systems, networks, and devices. It stops the unauthorised extraction of sensitive information. I check that technical tools actively monitor and block data exfiltration. ISO 27001:2022 Attributes Control Type Information Security Properties Cybersecurity Concepts Security Domains […]

ISO 27001 Annex A 8.12 Data Leakage Prevention: Certification Body Guide Read More »

ISO 27001 Annex A 8.13 Information Backup

ISO 27001 Annex A 8.13 Information Backup: Certification Body Guide

What is ISO 27001:2022 Annex A 8.13 Information backup in ISO 27001? ISO 27001 Annex A 8.13 is a documented process for maintaining backup copies of information and systems. Organisations must integrate these procedures into daily operational tools like SharePoint. This ensures data availability after technical failures. It mandates regular testing within your internal document

ISO 27001 Annex A 8.13 Information Backup: Certification Body Guide Read More »

ISO 27001 Annex A 8.14 Redundancy of Information Processing Facilities

ISO 27001 Annex A 8.14 Redundancy of Information Processing Facilities: Certification Body Guide

What is ISO 27001:2022 Annex A 8.14 Redundancy of information processing facilities in ISO 27001? Annex A 8.14 requires information processing facilities to have sufficient redundancy. This documented process ensures systems meet availability requirements. You must integrate these procedures into existing tools like SharePoint. It involves planning for component failures without relying on external software

ISO 27001 Annex A 8.14 Redundancy of Information Processing Facilities: Certification Body Guide Read More »

ISO 27001 Annex A 8.16 Monitoring Activities

ISO 27001 Annex A 8.16 Monitoring Activities: Certification Body Guide

What is ISO 27001:2022 Annex A 8.16 Monitoring activities in ISO 27001? Annex A 8.16 is a documented process for observing system behaviour. It identifies security anomalies through active review. Organisations must integrate this into daily operations using SharePoint or Jira. This ensures that technical teams manage security events within their standard environment. It excludes

ISO 27001 Annex A 8.16 Monitoring Activities: Certification Body Guide Read More »

ISO 27001 Annex A 8.17 Clock Synchronisation

ISO 27001 Annex A 8.17 Clock Synchronisation: Certification Body Guide

What is ISO 27001:2022 Annex A 8.17 Clock synchronisation in ISO 27001? ISO 27001 Annex A 8.17 ensures all clocks align across information systems. It is a documented process within your organisational tools. This control maintains log accuracy for forensic investigations. It prevents timestamps from becoming unreliable. Use SharePoint to store your time standards. Auditor’s

ISO 27001 Annex A 8.17 Clock Synchronisation: Certification Body Guide Read More »

ISO 27001 Annex A 8.18 Use of Privileged Utility Programs

ISO 27001 Annex A 8.18 Use of Privileged Utility Programs: Certification Body Guide

What is ISO 27001 Annex A 8.18 in ISO 27001? Annex A 8.18 requires a documented process for managing privileged utility programs. These tools can bypass or override established security controls. You must integrate their management into business-as-usual tools. This includes Jira for authorisation and SharePoint for policy. It ensures restricted access for authorised personnel

ISO 27001 Annex A 8.18 Use of Privileged Utility Programs: Certification Body Guide Read More »

ISO 27001 Annex A 8.19 Installation of Software on Operational Systems

ISO 27001 Annex A 8.19 Installation of Software on Operational Systems: Certification Body Guide

What is ISO 27001:2022 Annex A 8.19 in ISO 27001? Annex A 8.19 requires a documented process for installing software on operational systems. It ensures only authorised updates reach live environments. Management must use internal tools like Jira and SharePoint to track every change. This control protects system integrity. It prevents unverified software from disrupting

ISO 27001 Annex A 8.19 Installation of Software on Operational Systems: Certification Body Guide Read More »

ISO 27001 Annex A 8.20 Network Security

ISO 27001 Annex A 8.20 Networks Security: Certification Body Guide

What is ISO 27001:2022 Annex A 8.20 Networks security in ISO 27001? Network security involves managing network devices and services through documented configurations. Use SharePoint to store these standards. This ensures information availability and integrity. It requires integrating security controls into existing organisational workflows rather than relying on external dashboards. Manual oversight remains vital for

ISO 27001 Annex A 8.20 Networks Security: Certification Body Guide Read More »

ISO 27001 Annex A 8.21 Security of Network Services

ISO 27001 Annex A 8.21 Security of Network Services: Certification Body Guide

What is ISO 27001:2022 Annex A 8.21 Security of network services in ISO 27001? ISO 27001 Annex A 8.21 ensures security in network service agreements. Organisations must document these processes within SharePoint and Confluence. This control manages service levels and security requirements for all network providers. It integrates security into daily operations rather than using

ISO 27001 Annex A 8.21 Security of Network Services: Certification Body Guide Read More »

ISO 27001 Annex A 8.22 Segregation of Networks

ISO 27001 Annex A 8.22 Segregation of Networks: Certification Body Guide

What is ISO 27001:2022 Annex A 8.22 Segregation of networks in ISO 27001? ISO 27001 Annex A 8.22 requires network segregation into separate security perimeters. You must manage this through documented processes in SharePoint or Confluence. Boundaries should isolate sensitive traffic from untrusted areas. This control prevents unauthorised access across the network. Internal repositories provide

ISO 27001 Annex A 8.22 Segregation of Networks: Certification Body Guide Read More »

ISO 27001 Annex A 8.23 Web Filtering

ISO 27001 Annex A 8.23 Web Filtering: Certification Body Guide

What is ISO 27001:2022 Annex A 8.23 Web filtering in ISO 27001? Annex A 8.23 Web filtering is a documented process. It manages access to external websites to protect the organisation. This control reduces risks from malicious software and inappropriate content. Implementation involves integrating filtering rules into business-as-usual tools like SharePoint and Jira. It ensures

ISO 27001 Annex A 8.23 Web Filtering: Certification Body Guide Read More »

ISO 27001 Annex A 8.24 Use of Cryptography

ISO 27001 Annex A 8.24 Use of Cryptography: Certification Body Guide

What is ISO 27001:2022 Annex A 8.24 Use of cryptography in ISO 27001? ISO 27001:2022 Annex A 8.24 requires a documented policy for cryptographic controls. Organisations must integrate these rules into standard SharePoint and Confluence repositories. This process ensures data confidentiality and integrity through managed encryption. It focuses on human oversight rather than reliance on

ISO 27001 Annex A 8.24 Use of Cryptography: Certification Body Guide Read More »

ISO 27001 Annex A 8.25 Secure Development Life Cycle

ISO 27001 Annex A 8.25 Secure Development Life Cycle: Certification Body Guide

What is ISO 27001:2022 Annex A 8.25 Secure development life cycle in ISO 27001? ISO 27001 Annex A 8.25 requires a documented secure development life cycle for all software. This process must be integrated into standard project management tools like Jira. It ensures security is considered from the initial design through to deployment. Implementation relies

ISO 27001 Annex A 8.25 Secure Development Life Cycle: Certification Body Guide Read More »

ISO 27001 Annex A 8.26 Application Security Requirements

ISO 27001 Annex A 8.26 Application Security Requirements: Certification Body Guide

What is ISO 27001:2022 Annex A 8.26 Application security requirements in ISO 27001? ISO 27001 Annex A 8.26 requires applications to meet defined security requirements throughout their lifecycle. These requirements must be documented as a process integrated into business-as-usual tools. Management must verify that security needs align with technical specifications. This ensures resilience within your

ISO 27001 Annex A 8.26 Application Security Requirements: Certification Body Guide Read More »

ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles

ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles: Certification Body Guide

What is ISO 27001:2022 Annex A 8.27 Secure systems architecture and engineering principles in ISO 27001? ISO 27001 Annex A 8.27 requires documented principles for secure systems engineering. This process integrates security into your existing SharePoint and Jira workflows. It ensures you design and build systems using approved organisational standards. Management must own these principles

ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles: Certification Body Guide Read More »

ISO 27001 Annex A 8.28 Secure Coding

ISO 27001 Annex A 8.28 Secure Coding: Certification Body Guide

What is ISO 27001:2022 Annex A 8.28 Secure Coding in ISO 27001? Secure coding requires a documented set of rules for software development. Organisations must integrate these rules into business-as-usual tools like Jira and SharePoint. This approach ensures developers follow security principles during daily coding tasks. Auditors check for evidence of these processes within your

ISO 27001 Annex A 8.28 Secure Coding: Certification Body Guide Read More »

ISO 27001 Annex A 8.29 Security Testing in Development and Acceptance

ISO 27001 Annex A 8.29 Security Testing in Development and Acceptance: Certification Body Guide

What is ISO 27001:2022 Annex A 8.29 Security testing in development and acceptance in ISO 27001? Annex A 8.29 defines security testing as a documented process. It validates security requirements during development and final acceptance. Organisations integrate these tests into existing tools like Jira or SharePoint. This ensures verification occurs within native workflows. It prevents

ISO 27001 Annex A 8.29 Security Testing in Development and Acceptance: Certification Body Guide Read More »

ISO 27001 Annex A 8.30

ISO 27001 Annex A 8.30 Outsourced Development: Certification Body Guide

What is ISO 27001:2022 Annex A 8.30 Outsourced development in ISO 27001? Annex A 8.30 is a documented process for managing external software development. It integrates security requirements into the procurement cycle. Organisations use tools like SharePoint to store contracts. This control ensures that third parties follow internal coding standards. It prevents security gaps in

ISO 27001 Annex A 8.30 Outsourced Development: Certification Body Guide Read More »

ISO 27001 Annex A 8.31 Separation of Development, Test and Production Environments

ISO 27001 Annex A 8.31 Separation of Development, Test and Production Environments: Certification Body Guide

What is ISO 27001:2022 Annex A 8.31 Separation of development, test and production environments in ISO 27001? Annex A 8.31 is a documented process for isolating system environments. It separates development, testing, and production activities. This reduces risk of unauthorised access to live systems. Organisations manage these boundaries using tools like SharePoint. This approach ensures

ISO 27001 Annex A 8.31 Separation of Development, Test and Production Environments: Certification Body Guide Read More »

ISO 27001 Annex A 8.32 Change Management

ISO 27001 Annex A 8.32 Change Management: Certification Body Guide

What is ISO 27001:2022 Annex A 8.32 Change Management in ISO 27001? Annex A 8.32 defines a documented process for managing modifications to information processing systems. Organisations must plan, evaluate, and approve changes to maintain security integrity. Implementation relies on integrating these controls into existing workflows like Jira and SharePoint. This ensures management retains oversight

ISO 27001 Annex A 8.32 Change Management: Certification Body Guide Read More »

ISO 27001 Annex A 8.33 Test Information

ISO 27001 Annex A 8.33 Test Information: Certification Body Guide

What is ISO 27001:2022 Annex A 8.33 Test Information in ISO 27001? ISO 27001 Annex A 8.33 governs the protection of information used for system testing. This process requires documented procedures within SharePoint. It mandates masking production data before use. The control ensures test environments remain isolated. It prevents unauthorised exposure of sensitive organisational records

ISO 27001 Annex A 8.33 Test Information: Certification Body Guide Read More »

ISO 27001 Annex A 8.34 Protection of information systems during audit testing

ISO 27001 Annex A 8.34 Protection of Information Systems During Audit Testing: Certification Body Guide

What is ISO 27001:2022 Annex A 8.34 – Protection of Information Systems During Audit Testing in ISO 27001? ISO 27001 Annex A 8.34 ensures audit activities do not disrupt operational systems. Organisations manage this via documented schedules in SharePoint. It requires restricted access to production data during tests. This control integrates security checks into business-as-usual

ISO 27001 Annex A 8.34 Protection of Information Systems During Audit Testing: Certification Body Guide Read More »

ISO27001 Annex A 8.7 Protection Against Malware

ISO 27001 Annex A 8.7 Protection Against Malware: Certification Body Guide

What is ISO 27001 Annex A 8.7 in ISO 27001? Annex A 8.7 Protection Against Malware involves a documented strategy to detect and prevent malicious code. Organisations should integrate these procedures into existing tools like SharePoint. This control ensures staff manage malware risks through daily operational tasks. It excludes reliance on external software interfaces without

ISO 27001 Annex A 8.7 Protection Against Malware: Certification Body Guide Read More »

ISO27001-2022 Annex A 8.6 Capacity Management

ISO 27001 Annex A 8.6 Capacity Management: Certification Body Guide

What is ISO 27001 Annex A 8.6 in ISO 27001? Capacity management is a documented process for monitoring resource use. It ensures system availability by predicting future requirements. You must integrate this into business-as-usual tools. Use SharePoint to store capacity plans. Monitor metrics within your internal technical wikis to maintain service levels. This approach avoids

ISO 27001 Annex A 8.6 Capacity Management: Certification Body Guide Read More »

What is ISO 27001 Annex A 8.5 Secure Authentication?

ISO 27001 Annex A 8.5 Secure Authentication: Certification Body Guide

What is ISO 27001 Annex A 8.5 Secure Authentication in ISO 27001? ISO 27001 Annex A 8.5 requires a documented process to verify user identities before system access. This control integrates into daily operations via SharePoint policies and Jira workflows. It mandates Multi-Factor Authentication (MFA) and strong password standards. You must manage authentication credentials according

ISO 27001 Annex A 8.5 Secure Authentication: Certification Body Guide Read More »

ISO 27001 Annex A 8.4 Access To Source Code

ISO 27001 Annex A 8.4 Access To Source Code: Certification Body Guide

What is ISO 27001 Annex A 8.4 in ISO 27001? ISO 27001 Annex A 8.4 is a documented process to restrict program source code access. It integrates directly into business-as-usual tools like SharePoint and Jira. This control prevents unauthorised modifications and protects sensitive logic. Management must approve all repository permissions to maintain operational security. Auditor’s

ISO 27001 Annex A 8.4 Access To Source Code: Certification Body Guide Read More »

ISO 27001 Annex A 8.3 Information Access Restriction

ISO 27001 Annex A 8.3 Information Access Restriction: Certification Body Guide

What is ISO 27001 Annex A 8.3 Information Access Restriction in ISO 27001? ISO 27001 Annex A 8.3 requires restricting access to information according to defined organisational rules. It is a documented process managed within your standard business tools. You must enforce these restrictions using SharePoint permissions and Jira authorisation workflows. This ensures data protection

ISO 27001 Annex A 8.3 Information Access Restriction: Certification Body Guide Read More »

ISO 27001 Annex A 8.2 Privileged Access Rights

ISO 27001 Annex A 8.2 Privileged Access Rights: Certification Body Guide

What is ISO 27001 Annex A 8.2 in ISO 27001? ISO 27001 Annex A 8.2 restricts administrative powers to authorised users only. This process exists as documented workflows within your SharePoint and Jira environments. It ensures administrators use separate accounts for elevated tasks. Management monitors these rights through regular internal reviews. This approach integrates security

ISO 27001 Annex A 8.2 Privileged Access Rights: Certification Body Guide Read More »

ISO 27001 Annex A 8.1 User Endpoint Device Security

ISO 27001 Annex A 8.1 User Endpoint Device Security: Certification Body Guide

What is ISO 27001 Annex A 8.1 User Endpoint Device Security in ISO 27001? ISO 27001 Annex A 8.1 requires protecting information held on user endpoint devices. This control involves a documented process integrated into internal tools like SharePoint and Jira. It ensures that laptops, mobiles, and tablets meet security requirements before accessing data. Management

ISO 27001 Annex A 8.1 User Endpoint Device Security: Certification Body Guide Read More »

ISO 27001 Annex 7.14 Secure Disposal or Re-Use of Equipment

ISO 27001 Annex A 7.14 Secure Disposal or Re-Use of Equipment: Certification Body Guide

What is ISO 27001 Annex A 7.14 Secure Disposal or Re-Use of Equipment in ISO 27001? ISO 27001 Annex A 7.14 is a documented procedure for handling end-of-life hardware. It ensures data destruction before disposal or reallocation. Organisations manage this via internal tools like SharePoint and Jira. This approach maintains security during the decommissioning phase

ISO 27001 Annex A 7.14 Secure Disposal or Re-Use of Equipment: Certification Body Guide Read More »

ISO 27001 Annex 7.13 Equipment Maintenance

ISO 27001 Annex A 7.13 Equipment Maintenance: Certification Body Guide

What is ISO 27001 Annex A 7.13 Equipment Maintenance in ISO 27001? ISO 27001 Annex A 7.13 ensures equipment remains operational and secure. This documented process requires regular maintenance of hardware assets. Organisations manage these activities using internal SharePoint lists or Jira maintenance workflows. It ensures availability and integrity by following manufacturer specifications and internal

ISO 27001 Annex A 7.13 Equipment Maintenance: Certification Body Guide Read More »

ISO 27001 Annex 7.12 Cabling Security

ISO 27001 Annex A 7.12 Cabling Security: Certification Body Guide

What is ISO 27001 Annex A 7.12 Cabling Security in ISO 27001? ISO 27001 Annex A 7.12 protects power and data lines from unauthorized interception or physical damage. This documented process integrates into SharePoint site maps and asset registers. It ensures the physical security of telecommunications infrastructure. The control maintains information availability through active management

ISO 27001 Annex A 7.12 Cabling Security: Certification Body Guide Read More »

What is ISO 27001 Annex 7.11 Supporting Utilities?

ISO 27001 Annex A 7.11 Supporting Utilities: Certification Body Guide

What is ISO 27001 Annex A 7.11 Supporting Utilities in ISO 27001? Annex A 7.11 requires the protection of supporting utilities like electricity and water. These systems must be managed through documented processes integrated into SharePoint. This ensures availability and protects information assets from utility failure. Reliability depends on manual maintenance records and internal logs

ISO 27001 Annex A 7.11 Supporting Utilities: Certification Body Guide Read More »

What is ISO 27001 Annex 7.10 Storage Media?

ISO 27001 Annex A 7.10 Storage Media: Certification Body Guide

What is ISO 27001 Annex A 7.10 in ISO 27001? ISO 27001 Annex A 7.10 governs the lifecycle of physical and digital storage media. Organisations manage media through documented procedures within SharePoint. These rules cover acquisition, use, transportation, and disposal. Integration into existing document systems ensures accountability. It prevents unauthorised access or data leakage from

ISO 27001 Annex A 7.10 Storage Media: Certification Body Guide Read More »

ISO 27001 Annex 7.9 Security Of Assets Off-Premises

ISO 27001 Annex A 7.9 Security Of Assets Off-Premises: Certification Body Guide

What is ISO 27001 Annex A 7.9 in ISO 27001? ISO 27001 Annex A 7.9 is a documented process for securing assets away from company premises. This control integrates into daily operations through SharePoint and Jira workflows. It ensures assets like laptops or drives remain protected. Management must authorize all removals and track physical locations

ISO 27001 Annex A 7.9 Security Of Assets Off-Premises: Certification Body Guide Read More »

ISO 27001 Annex 7.8 Equipment Siting and Protection

ISO 27001 Annex A 7.8 Equipment Siting and Protection: Certification Body Guide

What is ISO 27001 Annex A 7.8 Equipment Siting and Protection in ISO 27001? Annex A 7.8 requires siting equipment to reduce environmental risks and unauthorised access. This process involves documenting hardware locations in internal asset registers like SharePoint. It ensures hardware remains protected from hazards and visual interference. Effective management integrates these siting decisions

ISO 27001 Annex A 7.8 Equipment Siting and Protection: Certification Body Guide Read More »

ISO 27001 Annex 7.7 Clear Desk and Clear Screen

ISO 27001 Annex A 7.7 Clear Desk and Clear Screen: Certification Body Guide

ISO 27001 7.7 Clear Desk and Clear Screen is a Physical control that protects information from unauthorised access and damage. It mandates that employees secure physical media and lock digital displays when workstations are unattended. This control ensures confidentiality and integrity across all organisational work environments. Attribute Value Control Type Physical Information Security Properties Confidentiality,

ISO 27001 Annex A 7.7 Clear Desk and Clear Screen: Certification Body Guide Read More »

ISO 27001 Annex 7.6 Working In Secure Areas

ISO 27001 Annex A 7.6 Working In Secure Areas: Certification Body Guide

What is ISO 27001 Annex A 7.6 Working In Secure Areas? ISO 27001 Annex A 7.6 is a documented process for managing personnel behaviour in protected zones. It requires specific rules for staff and external parties. You must integrate these procedures into business-as-usual tools. Use SharePoint or internal wikis to maintain accessibility. This ensures security

ISO 27001 Annex A 7.6 Working In Secure Areas: Certification Body Guide Read More »

ISO 27001 Annex 7.5 Protecting Against Physical and Environmental Threats

ISO 27001 Annex A 7.5 Protecting Against Physical and Environmental Threats: Certification Body Guide

What is ISO 27001 Annex A 7.5 Protecting Against Physical and Environmental Threats in ISO 27001? ISO 27001 Annex A 7.5 protects information from environmental hazards. This control requires a documented process integrated into internal tools. It mitigates risks from fire, floods, and power failures. Organisations must maintain physical protections and record all maintenance activities.

ISO 27001 Annex A 7.5 Protecting Against Physical and Environmental Threats: Certification Body Guide Read More »

What is ISO 27001 Annex 7.4 Physical Security Monitoring?

ISO 27001 Annex A 7.4 Physical Security Monitoring: Certification Body Guide

What is ISO 27001 Annex A 7.4 Physical Security Monitoring in ISO 27001? ISO 27001 Annex A 7.4 requires continuous surveillance of physical premises. This documented process must integrate with existing organisational tools like SharePoint. It ensures detection of unauthorised access or environmental threats. Effective monitoring relies on clear internal procedures rather than disconnected software.

ISO 27001 Annex A 7.4 Physical Security Monitoring: Certification Body Guide Read More »

ISO 27001 Annex 7.3 Securing Offices, Rooms and Facilities

ISO 27001 Annex A 7.3 Securing Offices, Rooms and Facilities: Certification Body Guide

What is ISO 27001 Annex A 7.3 Securing Offices, Rooms and Facilities in ISO 27001? ISO 27001 Annex A 7.3 is a documented process for protecting internal work areas. It requires organisations to secure rooms and facilities based on information sensitivity. Controls include locks and restricted access. These measures must be managed through internal tools

ISO 27001 Annex A 7.3 Securing Offices, Rooms and Facilities: Certification Body Guide Read More »

What is ISO 27001 Annex 7.2 Physical Entry?

ISO 27001 Annex A 7.2 Physical Entry: Certification Body Guide

What is ISO 27001 Annex A 7.2 Physical Entry in ISO 27001? ISO 27001 Annex A 7.2 Physical Entry controls access to secure areas. It requires documented procedures within standard office tools. Organisations must record every entry and exit. Management must review these logs regularly. This process ensures only authorised personnel enter sensitive locations to

ISO 27001 Annex A 7.2 Physical Entry: Certification Body Guide Read More »

ISO 27001 Annex 7.1 Physical Security Perimeters

ISO 27001 Annex A 7.1 Physical Security Perimeters: Certification Body Guide

What is ISO 27001 Annex A 7.1 Physical Security Perimeters in ISO 27001? ISO 27001 Annex A 7.1 defines physical security perimeters as protective boundaries for information assets. This control requires documented processes integrated into internal tools like SharePoint. It ensures that only authorised personnel access sensitive areas. Effective perimeters combine physical barriers with strict

ISO 27001 Annex A 7.1 Physical Security Perimeters: Certification Body Guide Read More »

ISO 27001 Annex 6.7 Remote Working

ISO 27001 Annex A 6.7 Remote Working: Certification Body Guide

What is ISO 27001 Annex A 6.7 Remote Working in ISO 27001? Annex A 6.7 requires documented rules for security in remote working. Organisations must implement controls for off-site locations. Use internal document management systems like SharePoint to store these policies. This ensures staff follow security protocols outside the office. It keeps organisational data protected

ISO 27001 Annex A 6.7 Remote Working: Certification Body Guide Read More »

ISO 27001 Annex 6.6 Confidentiality Or Non-Disclosure Agreements

ISO 27001 Annex A 6.6 Confidentiality Or Non-Disclosure Agreements: Certification Body Guide

What is Annex A 6.6 in ISO 27001? Annex A 6.6 requires documented confidentiality agreements. These protect organisational information from unauthorised disclosure. You must integrate these agreements into standard business workflows. Use SharePoint for version control. Use Jira for tracking signatures. This ensures legal protection is part of daily operations and internal culture. Auditor’s Eye:

ISO 27001 Annex A 6.6 Confidentiality Or Non-Disclosure Agreements: Certification Body Guide Read More »

What is ISO 27001 Annex 6.5 Responsibilities After Termination Or Change Of Employment?

ISO 27001 Annex A 6.5 Responsibilities After Termination Or Change Of Employment: Certification Body Guide

What is ISO 27001 Annex A 6.5 in ISO 27001? ISO 27001 Annex A 6.5 requires documented security responsibilities for staff leaving or changing roles. It ensures confidentiality duties continue after employment ends. This process must integrate into business-as-usual tools like Jira and SharePoint. It prevents data leaks and legal breaches during personnel transitions. Auditor’s

ISO 27001 Annex A 6.5 Responsibilities After Termination Or Change Of Employment: Certification Body Guide Read More »

What is ISO 27001 Annex 6.4 Disciplinary Process?

ISO 27001 Annex A 6.4 Disciplinary Process: Certification Body Guide

What is ISO 27001 Annex A 6.4 in ISO 27001? Annex A 6.4 defines the formal process following an information security breach. Organisations must document this within their standard HR tools. This ensures staff understand the consequences of security violations. It links personnel management directly to the security policy. Effective management requires manual records. Auditor’s

ISO 27001 Annex A 6.4 Disciplinary Process: Certification Body Guide Read More »

What is ISO 27001 Annex 6.3 Information Security Awareness Education and Training

ISO 27001 Annex A 6.3 Information Security Awareness Education and Training: Certification Body Guide

What is ISO 27001 Annex A 6.3 in ISO 27001? ISO 27001 Annex A 6.3 is a documented process for security training. It ensures staff follow security policies. The process must integrate with business tools. Do not treat training as a separate software task. It should be a cultural requirement within your organisation. Auditor’s Eye:

ISO 27001 Annex A 6.3 Information Security Awareness Education and Training: Certification Body Guide Read More »

ISO 27001 Annex 6.2 Terms and Conditions of Employment

ISO 27001 Annex A 6.2 Terms and Conditions of Employment: Certification Body Guide

What is ISO 27001 Annex A 6.2 Terms and Conditions of Employment? Annex A 6.2 requires contractual agreements to define security obligations for employees and contractors. This documented process ensures legal accountability for data protection. It must be integrated into standard HR workflows using internal tools like SharePoint. This clarifies responsibilities before personnel receive access

ISO 27001 Annex A 6.2 Terms and Conditions of Employment: Certification Body Guide Read More »

ISO 27001 Annex 6.1 Screening

ISO 27001 Annex A 6.1 Screening: Certification Body Guide

What is ISO 27001 Annex A 6.1 Screening? ISO 27001 Annex A 6.1 Screening ensures all candidates undergo background checks before employment. This documented process must integrate into internal HR workflows like SharePoint or Jira. It verifies identity, qualifications, and integrity. This control protects the organisation from internal threats by ensuring trustworthy personnel handle sensitive

ISO 27001 Annex A 6.1 Screening: Certification Body Guide Read More »

ISO 27001 Annex 5.37 Documented Operating Procedures

ISO 27001 Annex A 5.37 Documented Operating Procedures: Certification Body Guide

What is ISO 27001 Annex A 5.37 Documented Operating Procedures in ISO 27001? Documented operating procedures are written instructions for recurring security tasks. You must integrate these into your internal tools like SharePoint or Confluence. This ensures staff follow consistent security methods. Avoid external tools that separate procedures from daily work. These records prove operational

ISO 27001 Annex A 5.37 Documented Operating Procedures: Certification Body Guide Read More »

What is ISO 27001 Annex 5.36 Compliance With Policies, Rules And Standards For Information Security?

ISO 27001 Annex A 5.36 Compliance With Policies, Rules And Standards For Information Security: Certification Body Guide

What is Annex A 5.36 in ISO 27001? ISO 27001 Annex A 5.36 requires a documented process to verify adherence to security policies and legal rules. It integrates directly into business-as-usual tools like SharePoint. This control ensures that internal management systems monitor compliance. It avoids external black-box software by focusing on manual records within organizational

ISO 27001 Annex A 5.36 Compliance With Policies, Rules And Standards For Information Security: Certification Body Guide Read More »

What is ISO 27001 Annex 5.35 Independent Review Of Information Security?

ISO 27001 Annex A 5.35 Independent Review Of Information Security: Certification Body Guide

What is ISO 27001 Annex A 5.35 in ISO 27001? ISO 27001 Annex A 5.35 requires organisations to review their information security approach independently. You must assess the management of security and its implementation. This process must be documented within your organisational tools. It ensures policies and controls remain effective. Management must review the results

ISO 27001 Annex A 5.35 Independent Review Of Information Security: Certification Body Guide Read More »

ISO 27001 Annex 5.33 Protection Of Records

ISO 27001 Annex A 5.33 Protection Of Records: Certification Body Guide

What is ISO 27001 Annex A 5.33 Protection Of Records? ISO 27001 Annex A 5.33 is a control governing the lifecycle of organisational records. It ensures records remain legible, identifiable, and retrievable. The process must be integrated into business-as-usual tools like SharePoint. This prevents unauthorised alteration or destruction. Compliance requires following legal, statutory, and contractual

ISO 27001 Annex A 5.33 Protection Of Records: Certification Body Guide Read More »

What is ISO 27001 Annex 5.32 Intellectual Property Rights?

ISO 27001 Annex A 5.32 Intellectual Property Rights: Certification Body Guide

What is ISO 27001 Annex A 5.32 Intellectual Property Rights? ISO 27001 Annex A 5.32 is a control governing the protection of proprietary assets. It requires a documented process to identify IP. It mandates compliance with legal and contractual IP obligations. Organisations must integrate these rules into business-as-usual tools like SharePoint. This ensures protection for

ISO 27001 Annex A 5.32 Intellectual Property Rights: Certification Body Guide Read More »

ISO 27001 Annex 5.31 Legal, statutory, regulatory and contractual requirements

ISO 27001 Annex A 5.31 Legal, statutory, regulatory and contractual requirements: Certification Body Guide

What is ISO 27001 Annex A 5.31 in ISO 27001? ISO 27001 Annex A 5.31 requires the identification of legal and contractual obligations. You must document these requirements in a formal register. This process integrates into your business-as-usual tools like SharePoint. It ensures your security management system meets all external mandates. This prevents legal breaches

ISO 27001 Annex A 5.31 Legal, statutory, regulatory and contractual requirements: Certification Body Guide Read More »

What is ISO 27001 Annex 5.30 ICT Readiness For Business Continuity?

ISO 27001 Annex A 5.30 ICT Readiness For Business Continuity: Certification Body Guide

What is ISO 27001 Annex A 5.30 ICT Readiness For Business Continuity in ISO 27001? ISO 27001 Annex A 5.30 requires ICT systems to be ready for business disruptions. It is a documented process within your internal management system. It ensures that technical infrastructure meets recovery time and recovery point objectives. Use your existing SharePoint

ISO 27001 Annex A 5.30 ICT Readiness For Business Continuity: Certification Body Guide Read More »

What is ISO 27001 Annex 5.29 Information Security During Disruption?

ISO 27001 Annex A 5.29 Information Security During Disruption: Certification Body Guide

What is ISO 27001 Annex A 5.29 Information Security During Disruption? ISO 27001 Annex A 5.29 is a control requiring the preservation of security during business interruptions. It mandates documented processes to maintain data confidentiality, integrity, and availability. Organisations must embed these procedures within internal tools like SharePoint and Jira. This ensures security remains a

ISO 27001 Annex A 5.29 Information Security During Disruption: Certification Body Guide Read More »

What is ISO 27001 Annex 5.28 Collection Of Evidence?

ISO 27001 Annex A 5.28 Collection Of Evidence: Certification Body Guide

What is ISO 27001 Annex A 5.28 in ISO 27001? ISO 27001 Annex A 5.28 is a documented procedure for the collection of digital evidence. It ensures that organisations preserve information following a security incident. The process must integrate into business-as-usual tools like SharePoint. This preserves the integrity and admissibility of data for potential legal

ISO 27001 Annex A 5.28 Collection Of Evidence: Certification Body Guide Read More »

What is ISO 27001 Annex 5.27 Learning From Information Security Incidents?

ISO 27001 Annex A 5.27 Learning From Information Security Incidents: Certification Body Guide

What is ISO 27001 Annex A 5.27 Learning From Information Security Incidents? ISO 27001 Annex A 5.27 is a mandatory control. It requires organisations to evaluate information security incidents. This process identifies root causes. It ensures the management system improves over time. Use existing internal document repositories to record these findings. This ensures knowledge stays

ISO 27001 Annex A 5.27 Learning From Information Security Incidents: Certification Body Guide Read More »

What is ISO 27001 Annex 5.26 Response To Information Security Incidents?

ISO 27001 Annex A 5.26 Response To Information Security Incidents: Certification Body Guide

What is ISO 27001 Annex A 5.26 in ISO 27001? ISO 27001 Annex A 5.26 requires a documented process to manage security incidents. Organisations must identify: assess: and react to threats using internal business tools. This control ensures staff follow consistent steps during a breach. It focuses on maintaining evidence within your existing document management

ISO 27001 Annex A 5.26 Response To Information Security Incidents: Certification Body Guide Read More »

What is ISO 27001 Annex 5.25 Assessment And Decision On Information Security Events?

ISO 27001 Annex A 5.25 Assessment And Decision On Information Security Events: Certification Body Guide

What is ISO 27001 Annex A 5.25 in ISO 27001? Annex A 5.25 requires a documented procedure to evaluate security events. Organisations use existing tools to determine if events qualify as incidents. This process integrates into internal workflows like Jira. It ensures human oversight remains central to the security decision-making process. Accurate assessment protects organisational

ISO 27001 Annex A 5.25 Assessment And Decision On Information Security Events: Certification Body Guide Read More »

What is ISO 27001 Annex 5.24 Information Security Incident Management Planning and Preparation?

ISO 27001 Annex A 5.24 Information Security Incident Management Planning and Preparation: Certification Body Guide

What is ISO 27001 Annex A 5.24 in ISO 27001? ISO 27001 Annex A 5.24 requires a documented incident management plan. It focuses on preparation and planning before events occur. Organisations must integrate these procedures into daily tools like SharePoint and Jira. This control ensures responsibilities are clear. It establishes the foundation for effective response

ISO 27001 Annex A 5.24 Information Security Incident Management Planning and Preparation: Certification Body Guide Read More »

What is ISO 27001 Annex 5.23 Information Security For Use Of Cloud Services?

ISO 27001 Annex A 5.23 Information Security For Use Of Cloud Services: Certification Body Guide

What is ISO 27001 Annex A 5.23 in ISO 27001? Annex A 5.23 specifies processes for managing cloud service security. It requires documented policies for cloud acquisition: use: and exit. Organisations must integrate these rules into internal document management systems. This ensures management maintains control over external service providers and data residency. Active oversight replaces

ISO 27001 Annex A 5.23 Information Security For Use Of Cloud Services: Certification Body Guide Read More »

What is ISO 27001 Annex 5.22 Monitor, Review And Change Management Of Supplier Services?

ISO 27001 Annex A 5.22 Monitor, Review And Change Management Of Supplier Services

What is ISO 27001 Annex A 5.22 in ISO 27001? ISO 27001 Annex A 5.22 is a documented process for overseeing third-party service delivery. Organisations must monitor supplier performance against security requirements. This includes reviewing reports and managing contractual changes. Integrate these activities into business-as-usual tools like SharePoint and Jira. This ensures continuous security alignment

ISO 27001 Annex A 5.22 Monitor, Review And Change Management Of Supplier Services Read More »

What is ISO 27001 Annex 5.21 Managing Information Security In The ICT Supply Chain?

ISO 27001 Annex A 5.21 Managing Information Security In The ICT Supply Chain: Certification Body Guide

What is ISO 27001 Annex A 5.21 in ISO 27001? ISO 27001 Annex A 5.21 requires a documented process for technology supply chain security. Organisations must define security requirements for ICT products and services. You must integrate these into procurement using tools like SharePoint or Jira. This control protects against risks from third-party technology components.

ISO 27001 Annex A 5.21 Managing Information Security In The ICT Supply Chain: Certification Body Guide Read More »

What is ISO 27001 Annex 5.20 Addressing Information Security Within Supplier Agreements?

ISO 27001 Annex A 5.20 Addressing Information Security Within Supplier Agreements: Certification Body Guide

What is ISO 27001 Annex A 5.20 in ISO 27001? Annex A 5.20 requires documenting security obligations in supplier contracts. This process involves integrating specific clauses into your existing procurement workflows. Organisations must use internal document repositories like SharePoint to manage these agreements. This ensures security requirements remain an active part of the business contract

ISO 27001 Annex A 5.20 Addressing Information Security Within Supplier Agreements: Certification Body Guide Read More »

What is ISO 27001 Annex 5.19 Information Security In Supplier Relationships?

ISO 27001 Annex A 5.19 Information Security In Supplier Relationships: Certification Body Guide

What is ISO 27001 Annex A 5.19 in ISO 27001? ISO 27001 Annex A 5.19 requires a documented process to protect assets accessible by suppliers. Organisations must integrate security requirements into contracts using internal tools. This control ensures consistent protection levels across the supply chain. Management must maintain oversight within native document repositories like SharePoint.

ISO 27001 Annex A 5.19 Information Security In Supplier Relationships: Certification Body Guide Read More »

What is ISO 27001 Annex 5.17 Authentication Information?

ISO 27001 Annex A 5.17 Authentication Information: Certification Body Guide

What is ISO 27001 Annex A 5.17 Authentication Information in ISO 27001? Annex A 5.17 is a documented process for managing credentials and secrets. It ensures that authentication information remains confidential throughout its lifecycle. Organisations must integrate these procedures into internal repositories like SharePoint. This control prevents unauthorised access by securing the primary methods of

ISO 27001 Annex A 5.17 Authentication Information: Certification Body Guide Read More »

What is ISO 27001 Annex 5.16 Identity Management?

ISO 27001 Annex A 5.16 Identity Management: Certification Body Guide

What is ISO 27001 Annex A 5.16 Identity Management in ISO 27001? ISO 27001 Annex A 5.16 manages the full lifecycle of digital identities. It requires a documented process to identify and verify users. Organisations must integrate these procedures into internal tools like SharePoint and Jira. This ensures security remains part of daily business operations.

ISO 27001 Annex A 5.16 Identity Management: Certification Body Guide Read More »

What is ISO 27001 Annex 5.14 Information Transfer?

ISO 27001 Annex A 5.14 Information Transfer: Certification Body Guide

What is ISO 27001 Annex A 5.14 in ISO 27001? ISO 27001 Annex A 5.14 defines the requirements for secure information transfer. It is a documented process integrated into your primary business tools. The control requires rules: procedures: and agreements to protect information during transit. It covers all electronic: physical: and verbal transfers of data.

ISO 27001 Annex A 5.14 Information Transfer: Certification Body Guide Read More »

What is ISO 27001 Annex 5.13 Labelling Of Information?

ISO 27001 Annex A 5.13 Labelling Of Information: Certification Body Guide

What is ISO 27001 Annex A 5.13 in ISO 27001? Annex A 5.13 requires a documented process for labelling information. Organisations must apply labels to digital and physical assets based on classification levels. This process must integrate into SharePoint metadata or document headers. It ensures users understand handling requirements during daily business operations. Auditor’s Eye:

ISO 27001 Annex A 5.13 Labelling Of Information: Certification Body Guide Read More »

What is ISO 27001 Annex 5.12 Classification Of Information?

ISO 27001 Annex A 5.12 Classification Of Information: Certification Body Guide

What is ISO 27001 Annex A 5.12 in ISO 27001? ISO 27001 Annex A 5.12 is a documented process for categorising information based on its security needs. It requires organisations to implement a classification scheme integrated into internal document management systems. This ensures that protection levels are proportionate to data sensitivity. Proper implementation relies on

ISO 27001 Annex A 5.12 Classification Of Information: Certification Body Guide Read More »

What is ISO 27001 Annex 5.11 Return Of Assets?

ISO 27001 Annex A 5.11 Return Of Assets: Certification Body Guide

What is ISO 27001 Annex A 5.11 Return Of Assets in ISO 27001? Annex A 5.11 is a control requiring the return of all information assets upon termination of employment. This procedure involves documented handovers integrated into existing HR workflows. It protects against the loss of physical hardware and digital intellectual property. Success depends on

ISO 27001 Annex A 5.11 Return Of Assets: Certification Body Guide Read More »

What is ISO 27001 Annex 5.10 Acceptable Use Of Information And Other Associated Assets?

ISO 27001 Annex A 5.10 Acceptable Use Of Information And Other Associated Assets: Certification Body Guide

What is ISO 27001 Annex A 5.10 in ISO 27001? ISO 27001 Annex A 5.10 establishes rules for handling information and assets. It requires organisations to document acceptable use procedures within internal systems. This control ensures personnel understand their security responsibilities. Integration into daily workflows, such as SharePoint or internal wikis, provides the necessary structure

ISO 27001 Annex A 5.10 Acceptable Use Of Information And Other Associated Assets: Certification Body Guide Read More »

What is ISO 27001 Annex 5.9 Inventory Of Information And Other Associated Assets?

ISO 27001 Annex A 5.9 Inventory Of Information And Other Associated Assets: Certification Body Guide

What is Annex A 5.9 in ISO 27001? Annex A 5.9 is a documented process for identifying and managing assets. You must record information, software, hardware, and services. This process integrates into native tools like SharePoint. It ensures clear ownership and accountability. Effective management requires manual classification within your standard business workflows. Auditor’s Eye: The

ISO 27001 Annex A 5.9 Inventory Of Information And Other Associated Assets: Certification Body Guide Read More »

What is ISO 27001 Annex 5.8 Information Security In Project Management?

ISO 27001 Annex A 5.8 Information Security In Project Management: Certification Body Guide

What is ISO 27001 Annex A 5.8 in ISO 27001? Annex A 5.8 requires organisations to integrate information security into project management. This documented process ensures you address security risks throughout the project lifecycle. You must use business-as-usual tools like Jira and Confluence. This approach embeds security requirements directly into standard project delivery workflows. Auditor’s

ISO 27001 Annex A 5.8 Information Security In Project Management: Certification Body Guide Read More »

What is ISO 27001 Annex 5.7 Threat Intelligence?

ISO 27001 Annex A 5.7 Threat Intelligence: Certification Body Guide

What is ISO 27001 Annex A 5.7 in ISO 27001? Annex A 5.7 requires a documented process for threat intelligence. You must collect and analyse information regarding security threats. Integrate this process into business-as-usual tools like SharePoint or Jira. This ensures the organisation gains specific knowledge of risks. It moves beyond generic alerts to actionable

ISO 27001 Annex A 5.7 Threat Intelligence: Certification Body Guide Read More »

What is ISO 27001 Annex 5.6 Contact With Special Interest Groups?

ISO 27001 Annex A 5.6 Contact With Special Interest Groups: Certification Body Guide

What is ISO 27001 Annex A 5.6 in ISO 27001? Annex A 5.6 is a documented process for engaging with external security specialists. The organisation must maintain contact with professional associations or interest groups. This activity must integrate into business tools like SharePoint. It ensures your team receives updated information on emerging security threats. Auditor’s

ISO 27001 Annex A 5.6 Contact With Special Interest Groups: Certification Body Guide Read More »

What is ISO 27001 Annex 5.5 Contact With Authorities?

ISO 27001 Annex A 5.5 Contact With Authorities: Certification Body Guide

What is ISO 27001 Annex A 5.5 in ISO 27001? Annex A 5.5 requires a documented process for managing interactions with regulatory bodies. You must maintain an up-to-date registry of relevant authorities within your internal document management system. Use SharePoint or a company wiki to store contact details. This ensures timely communication during security incidents

ISO 27001 Annex A 5.5 Contact With Authorities: Certification Body Guide Read More »

What is ISO 27001 Annex 5.4 Management Responsibilities?

ISO 27001 Annex A 5.4 Management Responsibilities: Certification Body Guide

What is ISO 27001 Annex A 5.4 in ISO 27001? Annex A 5.4 requires management to mandate security adherence across all personnel. This is a documented process integrated into your existing business tools. You must avoid external software silos. Management must require staff to apply information security in accordance with the established ISMS. Auditor’s Eye:

ISO 27001 Annex A 5.4 Management Responsibilities: Certification Body Guide Read More »

What is ISO 27001 Annex 5.3 Segregation of Duties?

ISO 27001 Annex A 5.3 Segregation of Duties: Certification Body Guide

What is ISO 27001 Annex A 5.3 Segregation of Duties in ISO 27001? Annex A 5.3 requires separating conflicting duties to prevent fraud and error. Organisations must document these divisions within internal tools like SharePoint and Jira. This control ensures no single person has end-to-end control over a sensitive process. Integrated document systems provide verifiable

ISO 27001 Annex A 5.3 Segregation of Duties: Certification Body Guide Read More »

ISO 27001 Annex 5.2 Roles and Responsibilities

ISO 27001 Annex A 5.2 Roles and Responsibilities: Certification Body Guide

What is Annex A 5.2 in ISO 27001? Annex A 5.2 mandates the definition and communication of security roles. Management must assign these duties to ensure organisational accountability. Document these responsibilities within your existing tools like SharePoint and Confluence. This approach ensures security stays integrated with daily business operations. Avoid external software that separates staff

ISO 27001 Annex A 5.2 Roles and Responsibilities: Certification Body Guide Read More »

What is ISO 27001 Annex 5.1 Policies for Information Security?

ISO 27001 Annex A 5.1 Policies for Information Security: Certification Body Guide

What is Annex A 5.1 in ISO 27001? Annex A 5.1 requires high-level and topic-specific security policies. These must be documented within existing business tools like SharePoint. Management must review them at planned intervals. This ensures security rules align with organisational goals. Avoid using external software to host these core documents. Auditor’s Eye: The Shortcut

ISO 27001 Annex A 5.1 Policies for Information Security: Certification Body Guide Read More »

ISO 27001 Clause 10.2 Nonconformity and Corrective Action

ISO 27001 Clause 10.2 Nonconformity and Corrective Action: Certification Body Guide

ISO 27001 Clause 10.2 Nonconformity and Corrective Action is a corrective control that defines how organisations react to security failures. It mandates a systematic process to identify the root cause of issues, implement fixes, and verify that those actions prevent the problem from recurring across the management system. ISO 27001:2022 Attributes Attribute Value Control Type

ISO 27001 Clause 10.2 Nonconformity and Corrective Action: Certification Body Guide Read More »

ISO 27001 Clause 10.1 Continual Improvement

ISO 27001 Clause 10.1 Continual Improvement: Certification Body Guide

ISO 27001 Clause 10.1 Continual Improvement is a governance control that requires organisations to enhance the suitability, adequacy, and effectiveness of their ISMS. It ensures the management system evolves with new threats and business changes, using data from audits and reviews to drive meaningful security enhancements over time. ISO 27001 Clause 10.1 Attributes Attribute Requirement

ISO 27001 Clause 10.1 Continual Improvement: Certification Body Guide Read More »

ISO 27001 Clause 9.3 Management Review

ISO 27001 Clause 9.3 Management Review: Certification Body Guide

ISO 27001 Clause 9.3 Management Review is a performance evaluation control that requires top management to review the organisation’s ISMS at planned intervals. This process ensures the continued suitability, adequacy, and effectiveness of the security framework while aligning it with the strategic direction of the business. ISO 27001:2022 Attributes Attribute Value Control Type Administrative /

ISO 27001 Clause 9.3 Management Review: Certification Body Guide Read More »

ISO27001-2022 Clause 9.2 Internal Audit

ISO 27001 Clause 9.2 Internal Audit: Certification Body Guide

ISO 27001 Clause 9.2 Internal Audit is a mandatory performance evaluation control that requires organisations to conduct audits at planned intervals. It provides objective evidence that the ISMS conforms to standard requirements and remains effectively implemented. This process ensures management identifies gaps before they become critical security failures. ISO 27001:2022 Attributes Table Attribute Value Control

ISO 27001 Clause 9.2 Internal Audit: Certification Body Guide Read More »

ISO 27001 Clause 9.1 Monitoring, Measurement, Analysis and Evaluation

ISO 27001 Clause 9.1 Monitoring, Measurement, Analysis, Evaluation

ISO 27001 Clause 9.1 Monitoring, Measurement, Analysis, and Evaluation is a performance evaluation control that requires organisations to determine what needs monitoring to ensure ISMS effectiveness. It mandates the use of valid methods for analysis, ensuring that results allow management to evaluate security performance and objectives. Attributes Table Attribute Value Control Type Performance Evaluation (Check)

ISO 27001 Clause 9.1 Monitoring, Measurement, Analysis, Evaluation Read More »

ISO27001-2022 Clause 8.3 Information Security Risk Treatment

ISO 27001 Clause 8.3 Information Security Risk Treatment: Certification Body Guide

ISO 27001 Clause 8.3 Information Security Risk Treatment is an operational control that requires organisations to implement the risk treatment plan defined in Clause 6.1.3. It requires formal evidence that chosen security controls effectively mitigate identified risks to an acceptable level through consistent execution and management oversight. Attributes Table Attribute Value Control Type Operational /

ISO 27001 Clause 8.3 Information Security Risk Treatment: Certification Body Guide Read More »

ISO27001-2022 Clause 8.2 Information Security Risk Assessment

ISO 27001 Clause 8.2 Information Security Risk Assessment: Certification Body Guide

ISO 27001 Clause 8.2 Information Security Risk Assessment is an operational control that requires organisations to perform risk assessments at planned intervals. It ensures you identify and evaluate risks based on criteria established in Clause 6.1.2, keeping your risk treatment plan relevant and effective for your current business environment. Attributes Table Attribute Value Control Type

ISO 27001 Clause 8.2 Information Security Risk Assessment: Certification Body Guide Read More »

ISO 27001 Clause 8.1 Operational Planning and Control

ISO 27001 Clause 8.1 Operational Planning and Control: Certification Body Guide

ISO 27001 8.1 Operational Planning and Control is an operational control that requires organisations to establish criteria for information security processes. It mandates the implementation of these processes according to those criteria. It also demands management of planned changes and the control of any outsourced security processes. ISO 27001:2022 Attributes Attribute Type Value Control Type

ISO 27001 Clause 8.1 Operational Planning and Control: Certification Body Guide Read More »

ISO 27001 Clause 7.4 Communication

ISO 27001 Clause 7.4 Communication: Certification Body Guide

Gemini said ISO 27001 Clause 7.4 Communication is a mandatory management system requirement. It dictates how an organisation determines its internal and external information security communications. This process ensures the right stakeholders receive accurate information at the correct time. It directly supports the operational effectiveness of your entire ISMS. ISO 27001:2022 Attributes: Clause 7.4 Attribute

ISO 27001 Clause 7.4 Communication: Certification Body Guide Read More »

ISO 27001 Clause 7.3 Awareness

ISO 27001 Clause 7.3 Awareness: Certification Body Guide

ISO 27001 Clause 7.3 Awareness is a management control that ensures persons doing work under the organisation’s control understand the information security policy, their contribution to ISMS effectiveness, and the implications of non-conformance. It focuses on changing human behaviour to reduce security risks across the business. ISO 27001:2022 Attribute Mapping Attribute Classification Control Type Management

ISO 27001 Clause 7.3 Awareness: Certification Body Guide Read More »

ISO27001-2022 Clause 7.2 Competence

ISO 27001 Clause 7.2 Competence: Certification Body Guide

ISO 27001 Clause 7.2 Competence is a management control that requires organisations to determine the necessary competency of persons doing work under its control. It ensures staff possess the right education, training, or experience to protect information assets and satisfy the requirements of the management system effectively. ISO 27001:2022 Attributes Table Attribute Value Control Type

ISO 27001 Clause 7.2 Competence: Certification Body Guide Read More »

ISO 27001 Clause 7.1 Resources

ISO 27001 Clause 7.1 Resources: Certification Body Guide

ISO 27001 Clause 7.1 Resources is a management control that requires an organisation to determine and provide the resources needed to establish, implement, maintain, and continually improve the ISMS. It ensures the security function has the necessary people, infrastructure, and budget to operate and meet its security objectives. ISO 27001:2022 Control Attributes Attribute Value Control

ISO 27001 Clause 7.1 Resources: Certification Body Guide Read More »

ISO 27001 Clause 6.1.2 Information Security Risk Assessment

ISO 27001 Clause 6.1.2 Information Security Risk Assessment: Certification Body Guide

ISO 27001 Clause 6.1.2 Information security risk assessment is a governance process used to identify, analyse, and evaluate security threats. It requires a formal methodology to assess confidentiality, integrity, and availability. This documented assessment ensures that your security resources address the most significant business risks effectively. ISO 27001:2022 Attributes Attribute Value Control Type Governance /

ISO 27001 Clause 6.1.2 Information Security Risk Assessment: Certification Body Guide Read More »

ISO 27001 Clause 6.1.1 Actions to Address Risks and Opportunities

ISO 27001 Clause 6.1.1 Planning General: Certification Body Guide

ISO 27001 Clause 6.1 Actions to Address Risks and Opportunities is a planning control that requires organisations to identify and manage security risks. It ensures the management system achieves intended outcomes. This control mandates documented processes for risk assessment and treatment to prevent undesired effects. ISO 27001:2022 Attributes Attribute Classification Control Type Governance, Planning, Preventative

ISO 27001 Clause 6.1.1 Planning General: Certification Body Guide Read More »

ISO 27001 Clause 5.3 Organisational Roles, Responsibilities and Authorities

ISO 27001 Clause 5.3 Organisational Roles, Responsibilities and Authorities: Certification Body Guide

ISO 27001 Clause 5.3 Organisational roles, responsibilities and authorities is a management control that requires top management to assign and communicate security duties. It ensures personnel understand their specific obligations. This clarity supports the operational effectiveness of the Information Security Management System (ISMS). ISO 27001:2022 Attributes Attribute Classification Control Type Governance / Management CIA Properties

ISO 27001 Clause 5.3 Organisational Roles, Responsibilities and Authorities: Certification Body Guide Read More »

ISO 27001 Clause 5.1 Leadership and Commitment

ISO 27001 Clause 5.1 Leadership and Commitment: Certification Body Guide

ISO 27001 Clause 5.1 Leadership and commitment is a governance requirement that mandates top management to demonstrate active involvement in the ISMS. Leaders must align security with business strategy, provide necessary resources, and communicate security importance. It ensures accountability flows from the very top of the organisation. ISO 27001:2022 Attributes Attribute Value Control Type Governance

ISO 27001 Clause 5.1 Leadership and Commitment: Certification Body Guide Read More »

ISO 27001 Clause 4.4 Information Security Management System

ISO 27001 Clause 4.4 Information Security Management System (ISMS): Certification Body Guide

ISO 27001 Clause 4.4 Information Security Management System (ISMS) is a governance control that requires organisations to establish, implement, maintain, and continually improve their security framework. It mandates that you define processes and their interactions to protect information assets systematically and satisfy the requirements of the standard. ISO 27001:2022 Attributes Attribute Value Control Type Governance

ISO 27001 Clause 4.4 Information Security Management System (ISMS): Certification Body Guide Read More »

ISO 27001 Clause 4.3 Determining The Scope Of The Information Security Management System

ISO 27001 Clause 4.3 Determining The Scope Of The Information Security Management System (ISMS): Certification Body Guide

ISO 27001 Clause 4.3 Determining the scope of the ISMS is a governance control that defines the precise boundaries of security management. It requires identifying physical and logical perimeters while considering business interfaces. This documented statement ensures your security efforts apply to the correct assets and personnel. ISO 27001:2022 Attributes Attribute Classification Control Type Governance

ISO 27001 Clause 4.3 Determining The Scope Of The Information Security Management System (ISMS): Certification Body Guide Read More »

ISO 27001 Clause 4.2 Understanding The Needs And Expectations of Interested Parties

ISO 27001 Clause 4.2 Understanding The Needs And Expectations of Interested Parties: Certification Body Guide

ISO 27001 Clause 4.2 Understanding the needs and expectations of interested parties is a governance requirement that identifies stakeholders and their security needs. You must determine which of these requirements are relevant to your ISMS. It ensures your security strategy addresses legal, contractual, and regulatory obligations. ISO 27001:2022 Attributes Attribute Value Control Type Governance, Organisational,

ISO 27001 Clause 4.2 Understanding The Needs And Expectations of Interested Parties: Certification Body Guide Read More »

ISO 27001 Clause 4.1 Understanding The Organisation And Its Context

ISO 27001 Clause 4.1 Understanding The Organisation And Its Context: Certification Body Guide

ISO 27001 Clause 4.1 Understanding the organisation and its context is a governance control that requires defining internal and external issues affecting security. It ensures your security strategy aligns with business goals. This analysis forms the foundation for your entire ISMS, specifically informing your risk management and scope. ISO 27001 Clause 4.1 Attributes Attribute Classification

ISO 27001 Clause 4.1 Understanding The Organisation And Its Context: Certification Body Guide Read More »