July 2024
Intermediate to advanced
486 pages
11h 19m
English
Although ISO 27002 no longer has a specific control that addresses ICT system acquisition, development, and maintenance, it is still worth considering the issue and applicable controls – after all, today’s organizations are frequently acquiring and deploying applications into their operating environments. Control 5.8 focuses specifically on information security in project management and that is appropriate for our purposes: Deployment of all new systems components should be subject to a project plan.
Systems, in this context, include infrastructure, external systems, operating systems, business applications, and user-developed systems. How the business process that will support the ...
Read now
Unlock full access