ISO 27001 Attributes Explained
ISO 27001 Attributes Introduced in the 2022 update to the standard, in this ultimate guide to ISO 27001 Attributes you […]
ISO 27001 Attributes Explained Read More »
The list of ISO 27001 Resilience Controls.
Resilience is an ISO 27001 Security Domain.
This includes Continuity of operations and Crisis management.
Security domains is an attribute to view controls from the perspective of four information security domains.
ISO 27001 Attributes Introduced in the 2022 update to the standard, in this ultimate guide to ISO 27001 Attributes you […]
ISO 27001 Attributes Explained Read More »
ISO 27001 Annex A 8.14 is a security control that mandates the implementation of redundancy in information processing facilities to
ISO 27001 Annex A 7.13 Equipment Maintenance is a security control that mandates organisations maintain hardware according to manufacturer specifications
ISO 27001:2022 Annex A 7.13 Equipment Maintenance : The Lead Auditor’s Guide. Read More »
In this guide, I will show you exactly how to implement ISO 27001 Annex A 5.30 and ensure you pass
ISO 27001:2022 Annex A 5.30 ICT readiness for business continuity Read More »
In this guide, I will show you exactly how to implement ISO 27001 Annex A 5.29 and ensure you pass
ISO 27001:2022 Annex A 5.29 Information security during disruption Read More »
Beginner’s Guide to the new ISO 27001 control – ISO 27001 Annex A 5.7 / ISO 27002: 2022 Clause 5.7 Threat Intelligence
ISO 27001:2022 Annex A 5.7 Threat intelligence Read More »
Beginner’s Guide to ISO 27001 Annex A 5.5 / ISO 27002: 2022 Clause 5.5 Contact with Authorities
ISO 27001:2022 Annex A 5.5 Contact with authorities Read More »
Beginner’s Guide to ISO27001 Annex A 5.2 / ISO27002: 2022 Clause 5.2 Information Security Roles and Responsibilities
ISO 27001:2022 Annex A 5.2 Information security roles and responsibilities Read More »
Learn ISO 27001 Annex A 5.1 Policies for Information Security. What’s new, examples, templates, walkthrough and how to implement it.
ISO 27001:2022 Annex A 5.1 Policies for information security Read More »