How To Create an ISO 27001 Threat Intelligence Process and Report

How To Create an ISO 27001 Threat Intelligence Process and Report

Threat intelligence is a new control introduced in the ISO 27001:2022 update. It is called ISO 27001:2022 Annex A 5.7 Threat Intelligence. In this article you will learn: What it is ISO 27001 Threat Intelligence How to implement ISO 27001 Threat Intelligence How to...
ISO 27001:2022 Annex A 8.33 Test Information Explained

ISO 27001:2022 Annex A 8.33 Test Information Explained

ISO 27001 Test Information is an ISO 27001 control that requires an organisation to protect production and operational information when used for testing. Table of contentsWhat is it?Applicability to Small Businesses, Tech Startups, and AI CompaniesWhy do you...
ISO 27001:2022 Annex A 8.32 Change Management Explained

ISO 27001:2022 Annex A 8.32 Change Management Explained

ISO 27001 Annex A 8.32 Change Management is an ISO 27001 control that requires organisations to manage changes to both the information security management system (ISMS) and to the information processing facilities. Key Takeaways Formal management of changes...
ISO 27001:2022 Annex A 8.30 Outsourced Development Explained

ISO 27001:2022 Annex A 8.30 Outsourced Development Explained

Table of contentsISO 27001 Outsourced DevelopmentImplementation GuideImplementation ChecklistAudit ChecklistConclusionFAQRelated ISO 27001 ControlsFurther Reading ISO 27001 Outsourced Development ISO 27001 Annex A 8.30 Outsourced Development is an ISO 27001...
ISO 27001:2022 Annex A 8.28 Secure Coding Explained

ISO 27001:2022 Annex A 8.28 Secure Coding Explained

Table of contentsISO 27001 Secure CodingImplementation GuideISO 27001 Annex A 8.28 FAQISO 27002 Control 8.28Related ISO 27001 ControlsFurther ReadingISO 27001 Annex A 8.28 Control and Attributes Table ISO 27001 Secure Coding ISO 27001 Annex A 8.28 Secure Coding...