Information Security Risk Management for ISO 27001ISO 27002, third edition by Alan Calder & Steve Watkins

Information Security Risk Management for ISO 27001ISO 27002, third edition by Alan Calder & Steve Watkins

Author:Alan Calder & Steve Watkins [Alan Calder]
Language: eng
Format: epub
Publisher: IT Governance Publishing
Published: 2019-08-28T16:00:00+00:00


30Much of this chapter reiterates (but does not replace) content that is already in IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002 (Kogan Page, 2019), and is repeated here to provide context for the further contents of this book. Readers are encouraged to read the original book for the full value of the contents of this chapter.

31Readers who do not already have copies of both ISO/IEC 27001:2013 and ISO/IEC 27002:2013 should obtain their own copies and read them. The standards are the key documents against which accredited certification is carried out. Copies of the standards (in either paper or downloadable format) can be obtained from national standards bodies and from the IT Governance online shop (www.itgovernance.co.uk/standards).

32ISO 27000:2018, Clause 4.2.2.

33ISO 27000:2018, Clause 3.10.

34ISO 27000:2018, Clause 3.36.

35ISO 27000:2018, Clause 3.7.

36The information security policy template in the ISO 27001 ISMS Documentation Toolkit is drafted specifically to meet all these requirements and, like other top-level documents within the toolkit, needs minimal adaptation to meet the needs of individual organisations (see www.itgovernance.co.uk/shop/product/iso-27001-ISO27001-isms-documentation-toolkit).



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.