All Modules Flashcards
Owns information security, approves the policy?
Management
Are responsible for their own processes, risks and countermeasures
Departments
Has a role with respect to the organisation’s information security stance
Everyone
Coordinates tasks to deliver project
Project Team
Identify and evaluate risks
Risk assessors
Coordinate controls to mitigate risks and accept residual risk.
Risk owners
Set of interrelated or interacting activities that use inputs to deliver an intended result
process
Specified way to carry out an activity or a process
Procedure (can be documented or not)
Document stating results achieved or providing evidence of activities performed
Record
Mandatory requirements of what does need to be documented in ISO 27001
- Scope (4.3)
- Information security policy (5.2 e)
- Information security risk assessment process (6.1.2)
- Statement of Applicability.
- Information security objectives. (6.2)
- Evidence of competence (7.2)
- Results of information security risk assessments (8.2)
- Results of information security risk treatment (8.3)
- Evidence of the information security performance monitoring and measurement results (9.1)
- Internal audit programme(s) and the audit results (9.2.2)
Action taken to eliminate the cause of a nonconformity.
Corrective action
Immediate action to eliminate a detected nonconformity
Correction
Size and complexity of an ISMS should be customised to the organisation?
True or false
True
Management system documentation should include the company names of the service providers?
True or False
False
Documents go through five stages as part of their lifecycle
True or False
True
Written
Reviewed and reworked
Approved
Distributed
Archived