August 2024
Intermediate to advanced
123 pages
2h 15m
English
Step five is a straightforward one; it looks at the information security controls that you already have in place, so that you can assess their adequacy and incorporate them into your ISMS.
As I said earlier, most organisations will have made many decisions about information security risks before they start the ISO 27001 implementation project; they have, after all, been in business for a time, dealing with threats and vulnerabilities for real. They will also have implemented several controls to comply with statutory, regulatory or contractual requirements. The organisation must then decide how it incorporates these existing controls into its ISMS and risk assessment methodology.
The requirement is to implement ...
Read now
Unlock full access