Security Policy: Difference between revisions

Jump to navigation Jump to search
Line 119: Line 119:
# Select appropriate information security risk treatment options, taking account of the risk assessment results;
# Select appropriate information security risk treatment options, taking account of the risk assessment results;
# Determine all controls that are necessary to implement the information security risk treatment option(s) chosen;
# Determine all controls that are necessary to implement the information security risk treatment option(s) chosen;
     <small>NOTE Organizations can design controls as required, or identify them from any source. </small>
     <small>NOTE Organizations can design controls as required, or identify them from any source. </small>
# Compare the controls determined above with those in Annex A of ISO/IEC 27001:2013 and verify that no necessary controls have been omitted;
# Compare the controls determined above with those in Annex A of ISO/IEC 27001:2013 and verify that no necessary controls have been omitted;