Information Security Risk Management for ISO 27001ISO 27002, third edition by Alan Calder & Steve Watkins
Author:Alan Calder & Steve Watkins [Alan Calder]
Language: eng
Format: epub
Publisher: IT Governance Publishing
Published: 2019-08-28T16:00:00+00:00
30Much of this chapter reiterates (but does not replace) content that is already in IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002 (Kogan Page, 2019), and is repeated here to provide context for the further contents of this book. Readers are encouraged to read the original book for the full value of the contents of this chapter.
31Readers who do not already have copies of both ISO/IEC 27001:2013 and ISO/IEC 27002:2013 should obtain their own copies and read them. The standards are the key documents against which accredited certification is carried out. Copies of the standards (in either paper or downloadable format) can be obtained from national standards bodies and from the IT Governance online shop (www.itgovernance.co.uk/standards).
32ISO 27000:2018, Clause 4.2.2.
33ISO 27000:2018, Clause 3.10.
34ISO 27000:2018, Clause 3.36.
35ISO 27000:2018, Clause 3.7.
36The information security policy template in the ISO 27001 ISMS Documentation Toolkit is drafted specifically to meet all these requirements and, like other top-level documents within the toolkit, needs minimal adaptation to meet the needs of individual organisations (see www.itgovernance.co.uk/shop/product/iso-27001-ISO27001-isms-documentation-toolkit).
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25294)
Hello! Python by Anthony Briggs(24339)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23433)
Kotlin in Action by Dmitry Jemerov(22512)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21976)
Dependency Injection in .NET by Mark Seemann(21848)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20711)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19523)
Grails in Action by Glen Smith Peter Ledbrook(18607)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17034)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15843)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13690)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11857)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9202)
The Kubernetes Operator Framework Book by Michael Dame(8570)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8407)
Robo-Advisor with Python by Aki Ranin(8361)