Book description
Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001.
Table of contents
- Cover
- Title
- Copyright
- Foreword
- About the Author
- Acknowledgements
- Disclaimer
- Contents
- Chapter 1: General
-
Chapter 2: Implementing and auditing ISMS control objectives and controls
- 2.1 Information security policies (ISO/IEC 27001, A.5)
- 2.2 Organization of information security (ISO/IEC 27001, A.6)
- 2.3 Human resource security (ISO/IEC 27001, A.7)
- 2.4 Asset management (ISO/IEC 27001, A.8)
- 2.5 Access control (ISO/IEC 27001, A.9)
- 2.6 Cryptography (ISO/IEC 27001, A.10)
- 2.7 Physical and environmental security (ISO/IEC 27001, A.11)
- 2.8 Operations security (ISO/IEC 27001, A.12)
- 2.9 Communications security (ISO/IEC 27001, A.13)
- 2.10 System acquisition, development and maintenance (ISO/IEC 27001, A.14)
- 2.11 Supplier relationships (ISO/IEC 27001, A.15)
- 2.12 Information security incident management (ISO/IEC 27001, A.16)
- 2.13 Information security aspects of business continuity management (ISO/IEC 27001, A.17)
- 2.14 Compliance (ISO/IEC 27001, A.18)
- Further reading
Product information
- Title: ISO 27001 controls – A guide to implementing and auditing
- Author(s):
- Release date: September 2019
- Publisher(s): IT Governance Publishing
- ISBN: 9781787781467
You might also like
book
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
book
Information Security Handbook
Implement information security effectively as per your organization's needs. About This Book Learn to build your …
book
Information Security Policies, Procedures, and Standards
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to …