Filter posts by category

ISO 27001 Annex A Controls

ISO 27001 Annex A 8.12 Data Leakage Prevention

ISO 27001:2022 Annex A 8.12 Data leakage prevention

What is ISO 27001:2022 Annex A 8.12 Data leakage prevention in ISO 27001? ISO 27001 Annex A 8.12 requires a documented process to prevent unauthorised disclosure of sensitive information. Organisations must integrate data leakage measures into business-as-usual tools like SharePoint and Jira. This control focuses on managing data flows through existing technical configurations. It rejects […]

ISO 27001:2022 Annex A 8.12 Data leakage prevention Read More »

ISO 27001 Annex A 8.14 Redundancy of Information Processing Facilities

ISO 27001:2022 Annex A 8.14 Redundancy of information processing facilities

What is ISO 27001:2022 Annex A 8.14 Redundancy of information processing facilities in ISO 27001? Annex A 8.14 requires information processing facilities to have sufficient redundancy. This documented process ensures systems meet availability requirements. You must integrate these procedures into existing tools like SharePoint. It involves planning for component failures without relying on external software

ISO 27001:2022 Annex A 8.14 Redundancy of information processing facilities Read More »

ISO 27001 Annex A 8.15 Logging

ISO 27001:2022 Annex A 8.15 Logging

What is ISO 27001:2022 Annex A 8.15 Logging in ISO 27001? Annex A 8.15 requires organisations to record security events, user activities, and exceptions. This is a documented process integrated into your existing business tools. You must store and protect these logs to prevent unauthorised changes. Local ownership ensures logs remain available for future security

ISO 27001:2022 Annex A 8.15 Logging Read More »

ISO 27001 Annex A 8.18 Use of Privileged Utility Programs

ISO 27001:2022 Annex A 8.18 Use of privileged utility programs

What is ISO 27001 Annex A 8.18 in ISO 27001? Annex A 8.18 requires a documented process for managing privileged utility programs. These tools can bypass or override established security controls. You must integrate their management into business-as-usual tools. This includes Jira for authorisation and SharePoint for policy. It ensures restricted access for authorised personnel

ISO 27001:2022 Annex A 8.18 Use of privileged utility programs Read More »

ISO 27001 Annex A 8.19 Installation of Software on Operational Systems

ISO 27001:2022 Annex A 8.19 Installation of software on operational systems

What is ISO 27001:2022 Annex A 8.19 in ISO 27001? Annex A 8.19 requires a documented process for installing software on operational systems. It ensures only authorised updates reach live environments. Management must use internal tools like Jira and SharePoint to track every change. This control protects system integrity. It prevents unverified software from disrupting

ISO 27001:2022 Annex A 8.19 Installation of software on operational systems Read More »

ISO 27001 Annex A 8.20 Network Security

ISO 27001:2022 Annex A 8.20 Networks security

What is ISO 27001:2022 Annex A 8.20 Networks security in ISO 27001? Network security involves managing network devices and services through documented configurations. Use SharePoint to store these standards. This ensures information availability and integrity. It requires integrating security controls into existing organisational workflows rather than relying on external dashboards. Manual oversight remains vital for

ISO 27001:2022 Annex A 8.20 Networks security Read More »

ISO 27001 Annex A 8.21 Security of Network Services

ISO 27001:2022 Annex A 8.21 Security of network services

What is ISO 27001:2022 Annex A 8.21 Security of network services in ISO 27001? ISO 27001 Annex A 8.21 ensures security in network service agreements. Organisations must document these processes within SharePoint and Confluence. This control manages service levels and security requirements for all network providers. It integrates security into daily operations rather than using

ISO 27001:2022 Annex A 8.21 Security of network services Read More »

ISO 27001 Annex A 8.22 Segregation of Networks

ISO 27001:2022 Annex A 8.22 Segregation of networks

What is ISO 27001:2022 Annex A 8.22 Segregation of networks in ISO 27001? ISO 27001 Annex A 8.22 requires network segregation into separate security perimeters. You must manage this through documented processes in SharePoint or Confluence. Boundaries should isolate sensitive traffic from untrusted areas. This control prevents unauthorised access across the network. Internal repositories provide

ISO 27001:2022 Annex A 8.22 Segregation of networks Read More »

ISO 27001 Annex A 8.26 Application Security Requirements

ISO 27001:2022 Annex A 8.26 Application security requirements

What is ISO 27001:2022 Annex A 8.26 Application security requirements in ISO 27001? ISO 27001 Annex A 8.26 requires applications to meet defined security requirements throughout their lifecycle. These requirements must be documented as a process integrated into business-as-usual tools. Management must verify that security needs align with technical specifications. This ensures resilience within your

ISO 27001:2022 Annex A 8.26 Application security requirements Read More »

ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles

ISO 27001:2022 Annex A 8.27 Secure systems architecture and engineering principles

What is ISO 27001:2022 Annex A 8.27 Secure systems architecture and engineering principles in ISO 27001? ISO 27001 Annex A 8.27 requires documented principles for secure systems engineering. This process integrates security into your existing SharePoint and Jira workflows. It ensures you design and build systems using approved organisational standards. Management must own these principles

ISO 27001:2022 Annex A 8.27 Secure systems architecture and engineering principles Read More »

ISO 27001 Annex A 8.29 Security Testing in Development and Acceptance

ISO 27001:2022 Annex A 8.29 Security testing in development and acceptance

What is ISO 27001:2022 Annex A 8.29 Security testing in development and acceptance in ISO 27001? Annex A 8.29 defines security testing as a documented process. It validates security requirements during development and final acceptance. Organisations integrate these tests into existing tools like Jira or SharePoint. This ensures verification occurs within native workflows. It prevents

ISO 27001:2022 Annex A 8.29 Security testing in development and acceptance Read More »

ISO 27001 Annex A 8.31 Separation of Development, Test and Production Environments

ISO 27001:2022 Annex A 8.31 Separation of development, test and production environments

What is ISO 27001:2022 Annex A 8.31 Separation of development, test and production environments in ISO 27001? Annex A 8.31 is a documented process for isolating system environments. It separates development, testing, and production activities. This reduces risk of unauthorised access to live systems. Organisations manage these boundaries using tools like SharePoint. This approach ensures

ISO 27001:2022 Annex A 8.31 Separation of development, test and production environments Read More »

ISO 27001 Annex A 8.32 Change Management

ISO 27001:2022 Annex A 8.32 Change Management

What is ISO 27001:2022 Annex A 8.32 Change Management in ISO 27001? Annex A 8.32 defines a documented process for managing modifications to information processing systems. Organisations must plan, evaluate, and approve changes to maintain security integrity. Implementation relies on integrating these controls into existing workflows like Jira and SharePoint. This ensures management retains oversight

ISO 27001:2022 Annex A 8.32 Change Management Read More »

ISO 27001 Annex A 8.34 Protection of information systems during audit testing

ISO 27001:2022 Annex A 8.34 Protection of Information Systems During Audit Testing

What is ISO 27001:2022 Annex A 8.34 – Protection of Information Systems During Audit Testing in ISO 27001? ISO 27001 Annex A 8.34 ensures audit activities do not disrupt operational systems. Organisations manage this via documented schedules in SharePoint. It requires restricted access to production data during tests. This control integrates security checks into business-as-usual

ISO 27001:2022 Annex A 8.34 Protection of Information Systems During Audit Testing Read More »

ISO 27001 Annex A 8.3 Information Access Restriction

ISO 27001 Annex A 8.3 Information Access Restriction

What is ISO 27001 Annex A 8.3 Information Access Restriction in ISO 27001? ISO 27001 Annex A 8.3 requires restricting access to information according to defined organisational rules. It is a documented process managed within your standard business tools. You must enforce these restrictions using SharePoint permissions and Jira authorisation workflows. This ensures data protection

ISO 27001 Annex A 8.3 Information Access Restriction Read More »

ISO 27001 Annex 7.14 Secure Disposal or Re-Use of Equipment

ISO 27001 Annex A 7.14 Secure Disposal or Re-Use of Equipment

What is ISO 27001 Annex A 7.14 Secure Disposal or Re-Use of Equipment in ISO 27001? ISO 27001 Annex A 7.14 is a documented procedure for handling end-of-life hardware. It ensures data destruction before disposal or reallocation. Organisations manage this via internal tools like SharePoint and Jira. This approach maintains security during the decommissioning phase

ISO 27001 Annex A 7.14 Secure Disposal or Re-Use of Equipment Read More »

ISO 27001 Annex 7.13 Equipment Maintenance

ISO 27001 Annex A 7.13 Equipment Maintenance

What is ISO 27001 Annex A 7.13 Equipment Maintenance in ISO 27001? ISO 27001 Annex A 7.13 ensures equipment remains operational and secure. This documented process requires regular maintenance of hardware assets. Organisations manage these activities using internal SharePoint lists or Jira maintenance workflows. It ensures availability and integrity by following manufacturer specifications and internal

ISO 27001 Annex A 7.13 Equipment Maintenance Read More »

ISO 27001 Annex 7.12 Cabling Security

ISO 27001 Annex A 7.12 Cabling Security

What is ISO 27001 Annex A 7.12 Cabling Security in ISO 27001? ISO 27001 Annex A 7.12 protects power and data lines from unauthorized interception or physical damage. This documented process integrates into SharePoint site maps and asset registers. It ensures the physical security of telecommunications infrastructure. The control maintains information availability through active management

ISO 27001 Annex A 7.12 Cabling Security Read More »

What is ISO 27001 Annex 7.10 Storage Media?

ISO 27001 Annex A 7.10 Storage Media

What is ISO 27001 Annex A 7.10 in ISO 27001? ISO 27001 Annex A 7.10 governs the lifecycle of physical and digital storage media. Organisations manage media through documented procedures within SharePoint. These rules cover acquisition, use, transportation, and disposal. Integration into existing document systems ensures accountability. It prevents unauthorised access or data leakage from

ISO 27001 Annex A 7.10 Storage Media Read More »

ISO 27001 Annex 7.8 Equipment Siting and Protection

ISO 27001 Annex A 7.8 Equipment Siting and Protection

What is ISO 27001 Annex A 7.8 Equipment Siting and Protection in ISO 27001? Annex A 7.8 requires siting equipment to reduce environmental risks and unauthorised access. This process involves documenting hardware locations in internal asset registers like SharePoint. It ensures hardware remains protected from hazards and visual interference. Effective management integrates these siting decisions

ISO 27001 Annex A 7.8 Equipment Siting and Protection Read More »

ISO 27001 Annex 7.5 Protecting Against Physical and Environmental Threats

ISO 27001 Annex A 7.5 Protecting Against Physical and Environmental Threats

What is ISO 27001 Annex A 7.5 Protecting Against Physical and Environmental Threats in ISO 27001? ISO 27001 Annex A 7.5 protects information from environmental hazards. This control requires a documented process integrated into internal tools. It mitigates risks from fire, floods, and power failures. Organisations must maintain physical protections and record all maintenance activities.

ISO 27001 Annex A 7.5 Protecting Against Physical and Environmental Threats Read More »

What is ISO 27001 Annex 7.4 Physical Security Monitoring?

ISO 27001 Annex A 7.4 Physical Security Monitoring

What is ISO 27001 Annex A 7.4 Physical Security Monitoring in ISO 27001? ISO 27001 Annex A 7.4 requires continuous surveillance of physical premises. This documented process must integrate with existing organisational tools like SharePoint. It ensures detection of unauthorised access or environmental threats. Effective monitoring relies on clear internal procedures rather than disconnected software.

ISO 27001 Annex A 7.4 Physical Security Monitoring Read More »

What is ISO 27001 Annex 7.2 Physical Entry?

ISO 27001 Annex A 7.2 Physical Entry

What is ISO 27001 Annex A 7.2 Physical Entry in ISO 27001? ISO 27001 Annex A 7.2 Physical Entry controls access to secure areas. It requires documented procedures within standard office tools. Organisations must record every entry and exit. Management must review these logs regularly. This process ensures only authorised personnel enter sensitive locations to

ISO 27001 Annex A 7.2 Physical Entry Read More »

ISO 27001 Annex 7.1 Physical Security Perimeters

ISO 27001 Annex A 7.1 Physical Security Perimeters

What is ISO 27001 Annex A 7.1 Physical Security Perimeters in ISO 27001? ISO 27001 Annex A 7.1 defines physical security perimeters as protective boundaries for information assets. This control requires documented processes integrated into internal tools like SharePoint. It ensures that only authorised personnel access sensitive areas. Effective perimeters combine physical barriers with strict

ISO 27001 Annex A 7.1 Physical Security Perimeters Read More »

ISO 27001 Annex 6.7 Remote Working

ISO 27001 Annex A 6.7 Remote Working

What is ISO 27001 Annex A 6.7 Remote Working in ISO 27001? Annex A 6.7 requires documented rules for security in remote working. Organisations must implement controls for off-site locations. Use internal document management systems like SharePoint to store these policies. This ensures staff follow security protocols outside the office. It keeps organisational data protected

ISO 27001 Annex A 6.7 Remote Working Read More »

ISO 27001 Annex 6.6 Confidentiality Or Non-Disclosure Agreements

ISO 27001 Annex A 6.6 Confidentiality Or Non-Disclosure Agreements

What is Annex A 6.6 in ISO 27001? Annex A 6.6 requires documented confidentiality agreements. These protect organisational information from unauthorised disclosure. You must integrate these agreements into standard business workflows. Use SharePoint for version control. Use Jira for tracking signatures. This ensures legal protection is part of daily operations and internal culture. Auditor’s Eye:

ISO 27001 Annex A 6.6 Confidentiality Or Non-Disclosure Agreements Read More »

What is ISO 27001 Annex 6.5 Responsibilities After Termination Or Change Of Employment?

ISO 27001 Annex A 6.5 Responsibilities After Termination Or Change Of Employment

What is ISO 27001 Annex A 6.5 in ISO 27001? ISO 27001 Annex A 6.5 requires documented security responsibilities for staff leaving or changing roles. It ensures confidentiality duties continue after employment ends. This process must integrate into business-as-usual tools like Jira and SharePoint. It prevents data leaks and legal breaches during personnel transitions. Auditor’s

ISO 27001 Annex A 6.5 Responsibilities After Termination Or Change Of Employment Read More »

ISO 27001 Annex 6.2 Terms and Conditions of Employment

ISO 27001 Annex A 6.2 Terms and Conditions of Employment

What is ISO 27001 Annex A 6.2 Terms and Conditions of Employment? Annex A 6.2 requires contractual agreements to define security obligations for employees and contractors. This documented process ensures legal accountability for data protection. It must be integrated into standard HR workflows using internal tools like SharePoint. This clarifies responsibilities before personnel receive access

ISO 27001 Annex A 6.2 Terms and Conditions of Employment Read More »

ISO 27001 Annex 6.1 Screening

ISO 27001 Annex A 6.1 Screening

What is ISO 27001 Annex A 6.1 Screening? ISO 27001 Annex A 6.1 Screening ensures all candidates undergo background checks before employment. This documented process must integrate into internal HR workflows like SharePoint or Jira. It verifies identity, qualifications, and integrity. This control protects the organisation from internal threats by ensuring trustworthy personnel handle sensitive

ISO 27001 Annex A 6.1 Screening Read More »

ISO 27001 Annex 5.37 Documented Operating Procedures

ISO 27001 Annex A 5.37 Documented Operating Procedures

What is ISO 27001 Annex A 5.37 Documented Operating Procedures in ISO 27001? Documented operating procedures are written instructions for recurring security tasks. You must integrate these into your internal tools like SharePoint or Confluence. This ensures staff follow consistent security methods. Avoid external tools that separate procedures from daily work. These records prove operational

ISO 27001 Annex A 5.37 Documented Operating Procedures Read More »

What is ISO 27001 Annex 5.36 Compliance With Policies, Rules And Standards For Information Security?

ISO 27001 Annex A 5.36 Compliance With Policies, Rules And Standards For Information Security

What is Annex A 5.36 in ISO 27001? ISO 27001 Annex A 5.36 requires a documented process to verify adherence to security policies and legal rules. It integrates directly into business-as-usual tools like SharePoint. This control ensures that internal management systems monitor compliance. It avoids external black-box software by focusing on manual records within organizational

ISO 27001 Annex A 5.36 Compliance With Policies, Rules And Standards For Information Security Read More »

What is ISO 27001 Annex 5.35 Independent Review Of Information Security?

ISO 27001 Annex A 5.35 Independent Review Of Information Security

What is ISO 27001 Annex A 5.35 in ISO 27001? ISO 27001 Annex A 5.35 requires organisations to review their information security approach independently. You must assess the management of security and its implementation. This process must be documented within your organisational tools. It ensures policies and controls remain effective. Management must review the results

ISO 27001 Annex A 5.35 Independent Review Of Information Security Read More »

ISO 27001 Annex 5.33 Protection Of Records

ISO 27001 Annex A 5.33 Protection Of Records

What is ISO 27001 Annex A 5.33 Protection Of Records? ISO 27001 Annex A 5.33 is a control governing the lifecycle of organisational records. It ensures records remain legible, identifiable, and retrievable. The process must be integrated into business-as-usual tools like SharePoint. This prevents unauthorised alteration or destruction. Compliance requires following legal, statutory, and contractual

ISO 27001 Annex A 5.33 Protection Of Records Read More »

ISO 27001 Annex 5.31 Legal, statutory, regulatory and contractual requirements

ISO 27001 Annex A 5.31 Legal, statutory, regulatory and contractual requirements

What is ISO 27001 Annex A 5.31 in ISO 27001? ISO 27001 Annex A 5.31 requires the identification of legal and contractual obligations. You must document these requirements in a formal register. This process integrates into your business-as-usual tools like SharePoint. It ensures your security management system meets all external mandates. This prevents legal breaches

ISO 27001 Annex A 5.31 Legal, statutory, regulatory and contractual requirements Read More »

What is ISO 27001 Annex 5.29 Information Security During Disruption?

ISO 27001 Annex A 5.29 Information Security During Disruption

What is ISO 27001 Annex A 5.29 Information Security During Disruption? ISO 27001 Annex A 5.29 is a control requiring the preservation of security during business interruptions. It mandates documented processes to maintain data confidentiality, integrity, and availability. Organisations must embed these procedures within internal tools like SharePoint and Jira. This ensures security remains a

ISO 27001 Annex A 5.29 Information Security During Disruption Read More »

What is ISO 27001 Annex 5.27 Learning From Information Security Incidents?

ISO 27001 Annex A 5.27 Learning From Information Security Incidents

What is ISO 27001 Annex A 5.27 Learning From Information Security Incidents? ISO 27001 Annex A 5.27 is a mandatory control. It requires organisations to evaluate information security incidents. This process identifies root causes. It ensures the management system improves over time. Use existing internal document repositories to record these findings. This ensures knowledge stays

ISO 27001 Annex A 5.27 Learning From Information Security Incidents Read More »

What is ISO 27001 Annex 5.26 Response To Information Security Incidents?

ISO 27001 Annex A 5.26 Response To Information Security Incidents

What is ISO 27001 Annex A 5.26 in ISO 27001? ISO 27001 Annex A 5.26 requires a documented process to manage security incidents. Organisations must identify: assess: and react to threats using internal business tools. This control ensures staff follow consistent steps during a breach. It focuses on maintaining evidence within your existing document management

ISO 27001 Annex A 5.26 Response To Information Security Incidents Read More »

What is ISO 27001 Annex 5.25 Assessment And Decision On Information Security Events?

ISO 27001 Annex A 5.25 Assessment And Decision On Information Security Events

What is ISO 27001 Annex A 5.25 in ISO 27001? Annex A 5.25 requires a documented procedure to evaluate security events. Organisations use existing tools to determine if events qualify as incidents. This process integrates into internal workflows like Jira. It ensures human oversight remains central to the security decision-making process. Accurate assessment protects organisational

ISO 27001 Annex A 5.25 Assessment And Decision On Information Security Events Read More »

What is ISO 27001 Annex 5.24 Information Security Incident Management Planning and Preparation?

ISO 27001 Annex A 5.24 Information Security Incident Management Planning and Preparation

What is ISO 27001 Annex A 5.24 in ISO 27001? ISO 27001 Annex A 5.24 requires a documented incident management plan. It focuses on preparation and planning before events occur. Organisations must integrate these procedures into daily tools like SharePoint and Jira. This control ensures responsibilities are clear. It establishes the foundation for effective response

ISO 27001 Annex A 5.24 Information Security Incident Management Planning and Preparation Read More »

What is ISO 27001 Annex 5.23 Information Security For Use Of Cloud Services?

ISO 27001 Annex A 5.23 Information Security For Use Of Cloud Services

What is ISO 27001 Annex A 5.23 in ISO 27001? Annex A 5.23 specifies processes for managing cloud service security. It requires documented policies for cloud acquisition: use: and exit. Organisations must integrate these rules into internal document management systems. This ensures management maintains control over external service providers and data residency. Active oversight replaces

ISO 27001 Annex A 5.23 Information Security For Use Of Cloud Services Read More »

What is ISO 27001 Annex 5.22 Monitor, Review And Change Management Of Supplier Services?

ISO 27001 Annex A 5.22 Monitor, Review And Change Management Of Supplier Services

What is ISO 27001 Annex A 5.22 in ISO 27001? ISO 27001 Annex A 5.22 is a documented process for overseeing third-party service delivery. Organisations must monitor supplier performance against security requirements. This includes reviewing reports and managing contractual changes. Integrate these activities into business-as-usual tools like SharePoint and Jira. This ensures continuous security alignment

ISO 27001 Annex A 5.22 Monitor, Review And Change Management Of Supplier Services Read More »

What is ISO 27001 Annex 5.21 Managing Information Security In The ICT Supply Chain?

ISO 27001 Annex A 5.21 Managing Information Security In The ICT Supply Chain

What is ISO 27001 Annex A 5.21 in ISO 27001? ISO 27001 Annex A 5.21 requires a documented process for technology supply chain security. Organisations must define security requirements for ICT products and services. You must integrate these into procurement using tools like SharePoint or Jira. This control protects against risks from third-party technology components.

ISO 27001 Annex A 5.21 Managing Information Security In The ICT Supply Chain Read More »

What is ISO 27001 Annex 5.20 Addressing Information Security Within Supplier Agreements?

ISO 27001 Annex A 5.20 Addressing Information Security Within Supplier Agreements

What is ISO 27001 Annex A 5.20 in ISO 27001? Annex A 5.20 requires documenting security obligations in supplier contracts. This process involves integrating specific clauses into your existing procurement workflows. Organisations must use internal document repositories like SharePoint to manage these agreements. This ensures security requirements remain an active part of the business contract

ISO 27001 Annex A 5.20 Addressing Information Security Within Supplier Agreements Read More »

What is ISO 27001 Annex 5.19 Information Security In Supplier Relationships?

ISO 27001 Annex A 5.19 Information Security In Supplier Relationships

What is ISO 27001 Annex A 5.19 in ISO 27001? ISO 27001 Annex A 5.19 requires a documented process to protect assets accessible by suppliers. Organisations must integrate security requirements into contracts using internal tools. This control ensures consistent protection levels across the supply chain. Management must maintain oversight within native document repositories like SharePoint.

ISO 27001 Annex A 5.19 Information Security In Supplier Relationships Read More »

What is ISO 27001 Annex 5.18 Access Rights?

ISO 27001 Annex A 5.18 Access Rights

What is ISO 27001 Annex A 5.18 in ISO 27001? ISO 27001 Annex A 5.18 is a documented process for managing the lifecycle of access rights. It requires formal provisioning, periodic review, and timely revocation of permissions. This control must integrate into internal tools like SharePoint and Jira. It ensures that only authorised users hold

ISO 27001 Annex A 5.18 Access Rights Read More »

What is ISO 27001 Annex 5.17 Authentication Information?

ISO 27001 Annex A 5.17 Authentication Information

What is ISO 27001 Annex A 5.17 Authentication Information in ISO 27001? Annex A 5.17 is a documented process for managing credentials and secrets. It ensures that authentication information remains confidential throughout its lifecycle. Organisations must integrate these procedures into internal repositories like SharePoint. This control prevents unauthorised access by securing the primary methods of

ISO 27001 Annex A 5.17 Authentication Information Read More »

What is ISO 27001 Annex 5.10 Acceptable Use Of Information And Other Associated Assets?

ISO 27001 Annex A 5.10 Acceptable Use Of Information And Other Associated Assets

What is ISO 27001 Annex A 5.10 in ISO 27001? ISO 27001 Annex A 5.10 establishes rules for handling information and assets. It requires organisations to document acceptable use procedures within internal systems. This control ensures personnel understand their security responsibilities. Integration into daily workflows, such as SharePoint or internal wikis, provides the necessary structure

ISO 27001 Annex A 5.10 Acceptable Use Of Information And Other Associated Assets Read More »

What is ISO 27001 Annex 5.9 Inventory Of Information And Other Associated Assets?

ISO 27001 Annex A 5.9 Inventory Of Information And Other Associated Assets

What is Annex A 5.9 in ISO 27001? Annex A 5.9 is a documented process for identifying and managing assets. You must record information, software, hardware, and services. This process integrates into native tools like SharePoint. It ensures clear ownership and accountability. Effective management requires manual classification within your standard business workflows. Auditor’s Eye: The

ISO 27001 Annex A 5.9 Inventory Of Information And Other Associated Assets Read More »

What is ISO 27001 Annex 5.8 Information Security In Project Management?

ISO 27001 Annex A 5.8 Information Security In Project Management

What is ISO 27001 Annex A 5.8 in ISO 27001? Annex A 5.8 requires organisations to integrate information security into project management. This documented process ensures you address security risks throughout the project lifecycle. You must use business-as-usual tools like Jira and Confluence. This approach embeds security requirements directly into standard project delivery workflows. Auditor’s

ISO 27001 Annex A 5.8 Information Security In Project Management Read More »

What is ISO 27001 Annex 5.6 Contact With Special Interest Groups?

ISO 27001 Annex A 5.6 Contact With Special Interest Groups

What is ISO 27001 Annex A 5.6 in ISO 27001? Annex A 5.6 is a documented process for engaging with external security specialists. The organisation must maintain contact with professional associations or interest groups. This activity must integrate into business tools like SharePoint. It ensures your team receives updated information on emerging security threats. Auditor’s

ISO 27001 Annex A 5.6 Contact With Special Interest Groups Read More »

ISO 27001 Annex 5.2 Roles and Responsibilities

ISO 27001 Annex A 5.2 Roles and Responsibilities

What is Annex A 5.2 in ISO 27001? Annex A 5.2 mandates the definition and communication of security roles. Management must assign these duties to ensure organisational accountability. Document these responsibilities within your existing tools like SharePoint and Confluence. This approach ensures security stays integrated with daily business operations. Avoid external software that separates staff

ISO 27001 Annex A 5.2 Roles and Responsibilities Read More »

What is ISO 27001 Annex 5.1 Policies for Information Security?

ISO 27001 Annex A 5.1 Policies for Information Security

What is Annex A 5.1 in ISO 27001? Annex A 5.1 requires high-level and topic-specific security policies. These must be documented within existing business tools like SharePoint. Management must review them at planned intervals. This ensures security rules align with organisational goals. Avoid using external software to host these core documents. Auditor’s Eye: The Shortcut

ISO 27001 Annex A 5.1 Policies for Information Security Read More »