Wednesday, February 11, 2009

IMPLEMENTING INFORMATION SECURITY BASED ON ISO 27001 AND ISO 17799

IMPLEMENTING INFORMATION SECURITY BASED ON ISO 27001 AND ISO 17799 1 Introduction 2 Information security and ISO 27001 3 Certification 4 ISO 27001 and ISO 17799 5 Frameworks and management system integration 6 Documentation requirements and record control 7 Project team 8 Project initiation 9 Process approach and the PDCA cycle 10 Plan – establish the ISMS 11 Scope definition 12 Risk management 13 Assets within scope 14 Assessing risk 15 Risk treatment plan 16 Risk assessment tools 17 Statement of Applicability 18 Third party checklists and resources 19 Do – implement and operate the ISMS 20 Check – monitor and review the ISMS 21 Act – maintain and improve the ISMS 22 Measurement 23 Preparing for an ISMS audit

No comments:

Post a Comment