Security Policy: Difference between revisions

Jump to navigation Jump to search
No edit summary
 
(3 intermediate revisions by the same user not shown)
Line 343: Line 343:


The organization shall continually improve the suitability, adequacy and effectiveness of the information security management system
The organization shall continually improve the suitability, adequacy and effectiveness of the information security management system
== Apenndix ==
{| class="wikitable"
|-
! Clause !! Requirement
|-
| 1.3 || Scope of the ISMS
|-
| 2.2 & 3.2 || IS Policy & Objectives
|-
| 3.1.2 || Risk Assessment & Risk Treatment Methodology
|-
| 3.1.3.d || Statement of Applicability
|-
| 3.1.3.5 & 3.2 || Risk treatment plan
|-
| 5.2 || Risk assessment report
|-
| A.7.1.2 & A.13.2.4 || Definition of Security Roles and Responsibilities
|-
| A.8.1.1 || Inventory of Assets
|-
| A.8.1.3 || Acceptable Use of Assets
|-
| A.9.1.1 || Access Control Policy
|-
| A.12.1.1 || Operating Procedures for IT Management
|-
| A.14.2.5 || Secure System Engineering Principles
|-
| A.15.1.1 || Supplier Security Policy
|-
| A.16.1.5 || Incident Management Procedure
|-
| A.17.1.2 || Business Continuity Procedures
|-
| A.18.1.1 || Statutory, Regulatory, and Contractual Requirements
|-
| 4.2 || Records of Training, Skills, Experience and Qualifications
|-
| 6.1 || Monitoring and Measurement Results
|-
| 6.2 || Internal Audit Program
|-
| 6.2 || Results of Internal Audits
|-
| 6.3 || Results of the Management Review
|-
| 7.1 || Results of Corrective Actions
|-
| A.12.4.1 & 12.4.3 || Logs of User Activities, Exceptions, and Security Events
|-
| 4.5 || Procedure for document control
|-
| 4.5 || Controls for managing records
|-
| 6.2 || Procedure for internal audit
|-
| 7.1 || Procedure for corrective action
|-
| A.6.2.1 || Bring your own device (BYOD) policy
|-
| A.6.2.1 || Mobile device and teleworking policy
|-
| A.8.2.1-3 || Information classification policy
|-
| A.9.2.1, A.9.2.2, A.9.2.4, A.9.3.1, & A.9.4.3 || Password policy
|-
| A.8.3.2 & A.11.2.7 || Disposal and destruction policy
|-
| A.11.1.5 || Procedures for working in secure areas
|-
| A.11.2.9 || Clear desk and clear screen policy
|-
| A.12.1.2 & A.14.2.4 || Clear desk and clear screen policy
|-
| A.12.3.1 || Backup policy
|-
| A.13.2.1-3 || Information transfer policy
|-
| A.17.1.1 || Business impact analysis
|-
| A.17.1.3 || Exercising and testing plan
|-
| A.17.1.3 || Maintenance and review plan
|-
| A.17.2.1 || Business continuity strategy
|}
== See also==
[[Security_Appendix | Security Appendix]]