Skip to Main Content
ISO27001 in a Windows® Environment: The best practice handbook for a Microsoft® Windows® environment, Second Edition
book

ISO27001 in a Windows® Environment: The best practice handbook for a Microsoft® Windows® environment, Second Edition

by Brian Honan
April 2010
Intermediate to advanced content levelIntermediate to advanced
310 pages
3h 35m
English
IT Governance Publishing
Content preview from ISO27001 in a Windows® Environment: The best practice handbook for a Microsoft® Windows® environment, Second Edition

Chapter 4. Identify Your Information Assets

In order to know what protections and controls you should implement, it is important that you first understand what it is you are trying to protect. The standard expects that all information assets within the scope of the implementation of ISO27001 have been properly identified and a value placed on them.

So our first step in identifying our information assets should be to define the scope of the ISMS and identify what it will cover.

Define the scope of the ISMS

The scope is one of the most important items in planning your implementation of ISO27001. How broadly you define the scope will impact the amount of work and time required to roll out your ISO27001-based ISMS.

The scope of the ISMS could simply be ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Windows Server® 2012 Unleashed

Windows Server® 2012 Unleashed

Rand Morimoto, Michael Noel, Guy Yardeni, Omar Droubi, Andrew Abbate, Chris Amaris

Publisher Resources

ISBN: 9781849280495Purchase book