Security Policy: Difference between revisions
		
		
		
		Jump to navigation
		Jump to search
		
| No edit summary | |||
| (5 intermediate revisions by the same user not shown) | |||
| Line 114: | Line 114: | ||
| The organization shall retain documented information about the information security risk assessment process. | The organization shall retain documented information about the information security risk assessment process. | ||
| Link to [https://docs.google.com/document/d/1tTJzghkaG3uAAKIh5ITfGod7U8Q1MFsHjlOUYvCzWa0/edit Risk Assessment and Risk Treatment Methodology] |    Link to [https://docs.google.com/document/d/1tTJzghkaG3uAAKIh5ITfGod7U8Q1MFsHjlOUYvCzWa0/edit Risk Assessment and Risk Treatment Methodology] | ||
| ==== Information security risk treatment==== | ==== Information security risk treatment==== | ||
| Line 168: | Line 168: | ||
| :4. retain appropriate documented information as evidence of competence. | :4. retain appropriate documented information as evidence of competence. | ||
| <small>NOTE Applicable actions may include, for example: the provision of training to, the mentoring of, or the reassignment of current employees; or the hiring or contracting of competent persons. </small> |    <small>NOTE Applicable actions may include, for example: the provision of training to, the mentoring of, or the reassignment of current employees; or the hiring or contracting of competent persons. </small> | ||
| === Awareness=== | === Awareness=== | ||
| Line 343: | Line 343: | ||
| The organization shall continually improve the suitability, adequacy and effectiveness of the information security management system | The organization shall continually improve the suitability, adequacy and effectiveness of the information security management system | ||
| == Apenndix == | |||
| {| class="wikitable" | |||
| |- | |||
| ! Clause !! Requirement | |||
| |- | |||
| | 1.3 || Scope of the ISMS | |||
| |- | |||
| | 2.2 & 3.2 || IS Policy & Objectives | |||
| |- | |||
| | 3.1.2 || Risk Assessment & Risk Treatment Methodology | |||
| |- | |||
| | 3.1.3.d || Statement of Applicability | |||
| |- | |||
| | 3.1.3.5 & 3.2 || Risk treatment plan | |||
| |- | |||
| | 5.2 || Risk assessment report | |||
| |- | |||
| | A.7.1.2 & A.13.2.4 || Definition of Security Roles and Responsibilities | |||
| |- | |||
| | A.8.1.1 || Inventory of Assets | |||
| |- | |||
| | A.8.1.3 || Acceptable Use of Assets | |||
| |- | |||
| | A.9.1.1 || Access Control Policy | |||
| |- | |||
| | A.12.1.1 || Operating Procedures for IT Management | |||
| |- | |||
| | A.14.2.5 || Secure System Engineering Principles | |||
| |- | |||
| | A.15.1.1 || Supplier Security Policy | |||
| |- | |||
| | A.16.1.5 || Incident Management Procedure | |||
| |- | |||
| | A.17.1.2 || Business Continuity Procedures | |||
| |- | |||
| | A.18.1.1 || Statutory, Regulatory, and Contractual Requirements | |||
| |- | |||
| | 4.2 || Records of Training, Skills, Experience and Qualifications | |||
| |- | |||
| | 6.1 || Monitoring and Measurement Results | |||
| |- | |||
| | 6.2 || Internal Audit Program | |||
| |- | |||
| | 6.2 || Results of Internal Audits | |||
| |- | |||
| | 6.3 || Results of the Management Review | |||
| |- | |||
| | 7.1 || Results of Corrective Actions | |||
| |- | |||
| | A.12.4.1 & 12.4.3 || Logs of User Activities, Exceptions, and Security Events | |||
| |- | |||
| | 4.5 || Procedure for document control | |||
| |- | |||
| | 4.5 || Controls for managing records | |||
| |- | |||
| | 6.2 || Procedure for internal audit | |||
| |- | |||
| | 7.1 || Procedure for corrective action | |||
| |- | |||
| | A.6.2.1 || Bring your own device (BYOD) policy | |||
| |- | |||
| | A.6.2.1 || Mobile device and teleworking policy | |||
| |- | |||
| | A.8.2.1-3 || Information classification policy | |||
| |- | |||
| | A.9.2.1, A.9.2.2, A.9.2.4, A.9.3.1, & A.9.4.3 || Password policy | |||
| |- | |||
| | A.8.3.2 & A.11.2.7 || Disposal and destruction policy | |||
| |- | |||
| | A.11.1.5 || Procedures for working in secure areas | |||
| |- | |||
| | A.11.2.9 || Clear desk and clear screen policy | |||
| |- | |||
| | A.12.1.2 & A.14.2.4 || Clear desk and clear screen policy | |||
| |- | |||
| | A.12.3.1 || Backup policy | |||
| |- | |||
| | A.13.2.1-3 || Information transfer policy | |||
| |- | |||
| | A.17.1.1 || Business impact analysis | |||
| |- | |||
| | A.17.1.3 || Exercising and testing plan | |||
| |- | |||
| | A.17.1.3 || Maintenance and review plan | |||
| |- | |||
| | A.17.2.1 || Business continuity strategy | |||
| |} | |||
| == See also== | |||
| [[Security_Appendix | Security Appendix]] | |||