Knowledge Base

ISO 27001 Annex : A.14.2  Security in Development and Support Processes

ISO 27001 Annex : A.14.2 Security in Development and Support Processes

ISO 27001 Annex : A.14.2  Security in Development and Support Processes It’s objective is ensuring the creation and implementation of information security in the information system development process. A.14.2.1  Secure Development Policy Control- Regulations for software and system development should be laid down and applied to organizational developments. Implementation Guidance – Secure development includes a …

ISO 27001 Annex : A.14.2 Security in Development and Support Processes Read More »

ISO 27001 Annex : A.14.1.3  Protecting Application Services Transactions

ISO 27001 Annex : A.14.1.3 Protecting Application Services Transactions

Control- ISO 27001 Annex : A.14.1.3 Protecting Application Services Transactions in order to avoid incomplete transmission, misrouting, unauthorized messaging modification, unauthorized dissemination, unauthorized message replication, or replay, information concerning application service transactions should be covered. Implementation Guidance – The following should include information security considerations for application service transactions: The use by each party involved …

ISO 27001 Annex : A.14.1.3 Protecting Application Services Transactions Read More »

ISO 27001 Annex : A.14.1.2  Securing Application Services on Public Networks

ISO 27001 Annex : A.14.1.2 Securing Application Services on Public Networks

Control- ISO 27001 Annex : A.14.1.2 Securing Application Services on Public Networks Information about application services which pass through public networks should be protected against fraudulent activities, contract disputes, unauthorized disclosure, and modification. Implementation Guidance – Information security requirements will include the following for application services that cross public networks: Each party requires a level …

ISO 27001 Annex : A.14.1.2 Securing Application Services on Public Networks Read More »

ISO 27001 : Annex 14   System Acquisition, Development and Maintenance

ISO 27001 : Annex 14 System Acquisition, Development and Maintenance

ISO 27001 : Annex 14 System Acquisition , Development and Maintenance in this article is explain  A.14.1  Security Requirements of Information Systems & A.14.1.1  Information Security Requirements Analysis and Specification. A.14.1  Security Requirements of Information Systems Its objective is ensuring the information management for the entire lifecycle is an important part of information systems. This …

ISO 27001 : Annex 14 System Acquisition, Development and Maintenance Read More »

ISO 27001 Annex : A.13.2.3  Electronic Messaging & A.13.2.4  Confidentiality or Non-Disclosure Agreements

ISO 27001 Annex : A.13.2.3 Electronic Messaging & A.13.2.4 Confidentiality or Non-Disclosure Agreements

In this article explain ISO 27001 Annex : A.13.2.3 Electronic Messaging & A.13.2.4 Confidentiality or Non-Disclosure Agreements . A.13.2.3  Electronic Messaging Control- Electronic messaging information should be adequately protected. Implementation Guidance – The following should include information security aspects for electronic messages: Protecting messages against unauthorized access, change or denial of services in line with …

ISO 27001 Annex : A.13.2.3 Electronic Messaging & A.13.2.4 Confidentiality or Non-Disclosure Agreements Read More »

ISO 27001 Annex : A.13.2  Information Transfer

ISO 27001 Annex : A.13.2 Information Transfer

ISO 27001 Annex : A.13.2  Information Transfer Its objective is to maintain the security of information transferred to any external entity and within the organization. A.13.2.1  Information Transfer Policies and Procedures Control- In order to protect the transferees by using all types of communication facilities, official transfer policies, procedures and controls should be developed. Implementation …

ISO 27001 Annex : A.13.2 Information Transfer Read More »

ISO 27001 Annex : A.13 Communications Security

ISO 27001 Annex : A.13 Communications Security

ISO 27001 Annex : A.13 Communications Security in this article explain A.13.1  Network Security Management, A.13.1.1  Network Controls, A.13.1.2  Security of Network Services, A.13.1.3  Segregation in Networks. A.13.1  Network Security Management It’s objective is to ensure the security and supporting information processing facilities of the information in a network. A.13.1.1  Network Controls Control- To protect …

ISO 27001 Annex : A.13 Communications Security Read More »

ISO 27001 Annex : A.12.7  Information Systems Audit Considerations

ISO 27001 Annex : A.12.7 Information Systems Audit Considerations

ISO 27001 Annex : A.12.7 Information Systems Audit Considerations Its objective is minimizing the impact on operating systems of audit activities. A.12.7.1  Information Systems Audit Controls Control- The audit criteria and activities related to operating system verification should be carefully prepared and decided in order to reduce business process disturbance. Implementation Guidance – It is …

ISO 27001 Annex : A.12.7 Information Systems Audit Considerations Read More »

ISO 27001 Annex : A.12.6  Technical Vulnerability Management

ISO 27001 Annex : A.12.6 Technical Vulnerability Management

ISO 27001 Annex : A.12.6  Technical Vulnerability Management Its objective is to avoid technological vulnerabilities from being exploited. A.12.6.1  Management of Technical Vulnerabilities Control- Information on technological vulnerabilities of information systems used should be obtained in a timely manner, the exposure of the organization to such vulnerabilities should be assessed and appropriate measures taken to …

ISO 27001 Annex : A.12.6 Technical Vulnerability Management Read More »

ISO 27001 Annex : A.12.5  Control of Operational Software

ISO 27001 Annex : A.12.5 Control of Operational Software

ISO 27001 Annex : A.12.5 Control of Operational Software Its objective is to ensure operating system integrity. A.12.5.1  Installation of Software on Operational Systems Control- To control the installation of software on operating systems, procedures should be implemented. Implementation Guidance- To control changes in software on operational systems, the following guidelines should be considered: Trained …

ISO 27001 Annex : A.12.5 Control of Operational Software Read More »

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.