Skip to Main Content
Information Security Policy Development for Compliance
book

Information Security Policy Development for Compliance

by Barry L. Williams
April 2016
Intermediate to advanced content levelIntermediate to advanced
152 pages
4h 9m
English
Auerbach Publications
Content preview from Information Security Policy Development for Compliance
26
InformatIon SecurIty PolIcy DeveloPment for comPlIance
Asset and Capacity Management
Describe how network and informational
assets are identified and maintained in an
IT asset inventory.
Define the requirement that IT asset
inventories must be performed at
leastannually.
ISO/IEC 27001 A.7.1.1 L512
NIST SP 800-53 CM-8 L513
PM-5 L514
HIPAA Standard
PCI DSS V2.0 9.9.1 L515
AUP V5.0 D.1 L516
P.1 L517
Describe how informational assets
identified in the IT asset inventory are
associated with and owned by a
specificindividual or a designated part
oftheorganization.
ISO/IEC 27001 A.7.1.2 L518
NIST SP 800-53 CM-8 L519
HIPAA Standard
PCI DSS V2.0
AUP V5.0 P.1 L520 ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Writing Information Security Policies

Writing Information Security Policies

Scott Barman

Publisher Resources

ISBN: 9781466580589