Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Define ISMS scope – what businesses, business units, departments and/or systems are going to be covered by your Information Security Management System?

0
Posted

Define ISMS scope – what businesses, business units, departments and/or systems are going to be covered by your Information Security Management System?

0

• Inventory your information assets – the inventory of information systems, networks, databases, data items, documents etc. will be used in various ways e.g. to confirm that the ISMS scope is appropriate, identify business-critical and other especially valuable or vulnerable assets etc. (more below) • Conduct an information security risk assessment – ideally using a recognized formal method but a custom process may be acceptable if applied methodically. There’s more advice below. • (a) Prepare a Statement of Applicability – according to ISO/IEC 27000 [currently pending final release], the SoA is a “documented statement describing the control objectives and controls that are relevant and applicable to the organization’s ISMS”. Which of the control objectives from ISO/IEC 27002 are applicable to your ISMS, and which are irrelevant, not appropriate or otherwise not required? Document these management decisions in your SOA; and in parallel … (b) Prepare Risk Treatment Plan – ISO/IEC 2700

0

• Inventory your information assets – the inventory of information systems, networks, databases, data items, documents etc. will be used in various ways e.g. to confirm that the ISMS scope is appropriate, identify business-critical and other especially valuable or vulnerable assets etc. (more below). • Conduct an information security risk assessment – ideally using a recognized formal method but a custom process may be acceptable if applied methodically. There’s more advice below. • (a) Prepare a Statement of Applicability – according to ISO/IEC 27000, the SoA is a “documented statement describing the control objectives and controls that are relevant and applicable to the organization’s ISMS”. Which of the control objectives from ISO/IEC 27002 are applicable to your ISMS, and which are irrelevant, not appropriate or otherwise not required? Document these management decisions in your SOA; and in parallel … (b) Prepare Risk Treatment Plan – ISO/IEC 27000 describes the information secur

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123