Security Policy: Difference between revisions
		
		
		
		Jump to navigation
		Jump to search
		
| Line 273: | Line 273: | ||
| The organization shall determine: | The organization shall determine: | ||
| :1. what needs to be monitored and measured, including information security processes and controls; | |||
|  |  | ||
| :2. the methods for monitoring, measurement, analysis and evaluation, as applicable, to ensure valid results; | |||
| <small>NOTE The methods selected should produce comparable and reproducible results to be considered valid. </small> | <small>NOTE The methods selected should produce comparable and reproducible results to be considered valid. </small> | ||
| :3. when the monitoring and measuring shall be performed; | |||
| :4. who shall monitor and measure; | |||
| :5. when the results from monitoring and measurement shall be analysed and evaluated; and | |||
| :6. who shall analyse and evaluate these results. | |||
| The organization shall retain appropriate documented information as evidence of the monitoring and measurement results. | The organization shall retain appropriate documented information as evidence of the monitoring and measurement results. | ||
| Line 293: | Line 293: | ||
| The organization shall conduct internal audits at planned intervals to provide information on whether the information security management system: | The organization shall conduct internal audits at planned intervals to provide information on whether the information security management system: | ||
| :1. conforms to | |||
| ::(a) the organization’s own requirements for its information security management system; and | |||
| ::(b) the requirements of this International Standard; | |||
| :2. is effectively implemented and maintained. | |||
| The organization shall: | The organization shall: | ||
| :3. plan, establish, implement and maintain an audit programme(s), including the frequency, methods, responsibilities, planning requirements and reporting. The audit programme(s) shall take into consideration the importance of the processes concerned and the results of previous audits; | |||
| :4. define the audit criteria and scope for each audit; | |||
| :5. select auditors and conduct audits that ensure objectivity and the impartiality of the audit process; | |||
| :6. ensure that the results of the audits are reported to relevant management; and | |||
| :7. retain documented information as evidence of the audit programme(s) and the audit results. | |||
| ===Management review=== | ===Management review=== | ||
| Line 319: | Line 318: | ||
| The management review shall include consideration of: | The management review shall include consideration of: | ||
| :1. the status of actions from previous management reviews; | |||
| :2. changes in external and internal issues that are relevant to the information security management system; | |||
| :3. feedback on the information security performance, including trends in: | |||
| ::(a) nonconformities and corrective actions; | |||
| ::(b) monitoring and measurement results; | |||
| ::(c) audit results; and | |||
| ::(d) fulfilment of information security objectives; | |||
| :4. feedback from interested parties; | |||
| :5. results of risk assessment and status of risk treatment plan; and | |||
| :6. opportunities for continual improvement. | |||
| The outputs of the management review shall include decisions related to continual improvement opportunities and any needs for changes to the information security management system. | The outputs of the management review shall include decisions related to continual improvement opportunities and any needs for changes to the information security management system. | ||
| The organization shall retain documented information as evidence of the results of management reviews. | The organization shall retain documented information as evidence of the results of management reviews. | ||
| == Improvement== | == Improvement== | ||