ISO 27001:2022 Implementation - annex a controls explained in detail

Описание к видео ISO 27001:2022 Implementation - annex a controls explained in detail

ISO 27001:2022 Implementation - annex a controls explained in detail #iso27001 #isms #cybersecurity #informationsecurity #isoleadauditor #leadauditor






0:00 Brief Overview of ISO 27001 Annex A ISO 27001 Free Training Videos in Hindi
0:37 it provides an essential tool for managing security: a list of security controls (or safeguards) that are to be used to improve security of information.
1:18 There are 114 controls listed in ISO 27001
1:43 policies - controls on how the policies are written and
2:33 Organization of information security-controls on how the responsibilities are assigned; also includes the controls for mobile devices and teleworking
3:12 Human resources security - controls prior to employment, during and after the employment
4:47 Asset management - Controls related to inventory of assets and acceptable use, also for information classification and media handling
5:31 Access control - controls for Access control policy, user access management system and application access control, and user responsibilities
6:23 Cryptography - controls related to encryption and key management
6:49 security-controls defining secure areas, entry controls, protection against threats, equipment security secure disposal, clear desk and clear screen policy, etc.
8:48 A. 12 Operational security - lots of controls related to management of IT production: change management, capacity management, malware, backup, logging monitoring installation, vulnerabilities, etc.
8:51 Communications security - controls related to network Security segregation, network services, transfer of information, messaging, etc.
9:28 System acquisition, development and maintenance - controls defining security requirements and security in development and support processes
9:44 Supplier relationships - controls on what to include in agreements, and how to monitor the suppliers
10:14 Information security incident management-controls for reporting events and weaknesses, defining responsibilities, response procedures, and collection of evidence
11:17 Information security aspects of business continuity management - controls requiring the planning of business continuity, procedures, verification and reviewing and IT redundancy
12:07 Compliance-controls requiring the identification of applicable laws and regulations, intellectual property protection, personal data protection, and reviews of information security


ISO 27001 certification, ISO 27001 implementation, ISO 27001 overview, ISO 27001 controls, ISO 27001 risk assessment, #CyberSecurity

Комментарии

Информация по комментариям в разработке