Security Policy: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
(3 intermediate revisions by the same user not shown) | |||
Line 343: | Line 343: | ||
The organization shall continually improve the suitability, adequacy and effectiveness of the information security management system | The organization shall continually improve the suitability, adequacy and effectiveness of the information security management system | ||
== Apenndix == | |||
{| class="wikitable" | |||
|- | |||
! Clause !! Requirement | |||
|- | |||
| 1.3 || Scope of the ISMS | |||
|- | |||
| 2.2 & 3.2 || IS Policy & Objectives | |||
|- | |||
| 3.1.2 || Risk Assessment & Risk Treatment Methodology | |||
|- | |||
| 3.1.3.d || Statement of Applicability | |||
|- | |||
| 3.1.3.5 & 3.2 || Risk treatment plan | |||
|- | |||
| 5.2 || Risk assessment report | |||
|- | |||
| A.7.1.2 & A.13.2.4 || Definition of Security Roles and Responsibilities | |||
|- | |||
| A.8.1.1 || Inventory of Assets | |||
|- | |||
| A.8.1.3 || Acceptable Use of Assets | |||
|- | |||
| A.9.1.1 || Access Control Policy | |||
|- | |||
| A.12.1.1 || Operating Procedures for IT Management | |||
|- | |||
| A.14.2.5 || Secure System Engineering Principles | |||
|- | |||
| A.15.1.1 || Supplier Security Policy | |||
|- | |||
| A.16.1.5 || Incident Management Procedure | |||
|- | |||
| A.17.1.2 || Business Continuity Procedures | |||
|- | |||
| A.18.1.1 || Statutory, Regulatory, and Contractual Requirements | |||
|- | |||
| 4.2 || Records of Training, Skills, Experience and Qualifications | |||
|- | |||
| 6.1 || Monitoring and Measurement Results | |||
|- | |||
| 6.2 || Internal Audit Program | |||
|- | |||
| 6.2 || Results of Internal Audits | |||
|- | |||
| 6.3 || Results of the Management Review | |||
|- | |||
| 7.1 || Results of Corrective Actions | |||
|- | |||
| A.12.4.1 & 12.4.3 || Logs of User Activities, Exceptions, and Security Events | |||
|- | |||
| 4.5 || Procedure for document control | |||
|- | |||
| 4.5 || Controls for managing records | |||
|- | |||
| 6.2 || Procedure for internal audit | |||
|- | |||
| 7.1 || Procedure for corrective action | |||
|- | |||
| A.6.2.1 || Bring your own device (BYOD) policy | |||
|- | |||
| A.6.2.1 || Mobile device and teleworking policy | |||
|- | |||
| A.8.2.1-3 || Information classification policy | |||
|- | |||
| A.9.2.1, A.9.2.2, A.9.2.4, A.9.3.1, & A.9.4.3 || Password policy | |||
|- | |||
| A.8.3.2 & A.11.2.7 || Disposal and destruction policy | |||
|- | |||
| A.11.1.5 || Procedures for working in secure areas | |||
|- | |||
| A.11.2.9 || Clear desk and clear screen policy | |||
|- | |||
| A.12.1.2 & A.14.2.4 || Clear desk and clear screen policy | |||
|- | |||
| A.12.3.1 || Backup policy | |||
|- | |||
| A.13.2.1-3 || Information transfer policy | |||
|- | |||
| A.17.1.1 || Business impact analysis | |||
|- | |||
| A.17.1.3 || Exercising and testing plan | |||
|- | |||
| A.17.1.3 || Maintenance and review plan | |||
|- | |||
| A.17.2.1 || Business continuity strategy | |||
|} | |||
== See also== | |||
[[Security_Appendix | Security Appendix]] |