0%

Book Description

Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001.

Table of Contents

  1. Cover
  2. Title
  3. Copyright
  4. Foreword
  5. About the Author
  6. Acknowledgements
  7. Disclaimer
  8. Contents
  9. Chapter 1: General
    1. 1.1 Scope of this guide
    2. 1.2 Field of application
  10. Chapter 2: Implementing and auditing ISMS control objectives and controls
    1. 2.1 Information security policies (ISO/IEC 27001, A.5)
    2. 2.2 Organization of information security (ISO/IEC 27001, A.6)
    3. 2.3 Human resource security (ISO/IEC 27001, A.7)
    4. 2.4 Asset management (ISO/IEC 27001, A.8)
    5. 2.5 Access control (ISO/IEC 27001, A.9)
    6. 2.6 Cryptography (ISO/IEC 27001, A.10)
    7. 2.7 Physical and environmental security (ISO/IEC 27001, A.11)
    8. 2.8 Operations security (ISO/IEC 27001, A.12)
    9. 2.9 Communications security (ISO/IEC 27001, A.13)
    10. 2.10 System acquisition, development and maintenance (ISO/IEC 27001, A.14)
    11. 2.11 Supplier relationships (ISO/IEC 27001, A.15)
    12. 2.12 Information security incident management (ISO/IEC 27001, A.16)
    13. 2.13 Information security aspects of business continuity management (ISO/IEC 27001, A.17)
    14. 2.14 Compliance (ISO/IEC 27001, A.18)
  11. Further reading
54.144.95.36