ISO27001 Flashcards
4.1
Understanding the organization and its context
4.2
Understanding the needs and expectations of interested parties
4.3
Determining the scope of the information security management system
5.1
Leadership and commitment
5.2
Policy
Top management shall establish an information security policy that:
a) is appropriate to the purpose of the organization;
b) includes information security objectives (see 6.2) or provides the framework for setting information
security objectives;
c) includes a commitment to satisfy applicable requirements related to information security;
d) includes a commitment to continual improvement of the information security management system.
The information security policy shall:
e) be available as documented information;
f) be communicated within the organization;
g) be available to interested parties, as appropri
6.1
Actions to address risks and opportunities
6.1.2
Information security risk assessment
6.1.3
Information security risk treatment
6.2
Information security objectives and planning to achieve them
The organization shall establish information security objectives at relevant functions and levels.
The information security objectives shall:
a) be consistent with the information security policy;
b) be measurable (if practicable);
c) take into account applicable information security requirements, and results from risk assessment
and risk treatment;
d) be monitored;
e) be communicated;
f) be updated as appropriate;
g) be available as documented information.
The organization shall retain documented information on the information security objectives.
When planning how to achieve its information security objectives, the organization shall determine:
h) what will be done;
i) what resources will be required;
j) who will be responsible;
k) when it will be completed; and
l) how the results will be evaluated.
6.3
Planning of changes
When the organization determines the need for changes to the information security management
system, the changes shall be carried out in a planned manner.
7 & 7.1
Support
7.1 Resources
The organization shall determine and provide the resources needed for the establishment,
implementation, maintenance and continual improvement of the information security management
system.
7.2
Competence
The organization shall:
a) determine the necessary competence of person(s) doing work under its control that affects its
information security performance;
b) ensure that these persons are competent on the basis of appropriate education, training, or
experience;
c) where applicable, take actions to acquire the necessary competence, and evaluate the effectiveness
of the actions taken; and
d) retain appropriate documented information as evidence of competence.
NOTE Applicable actions can include, for example: the provision of training to, the mentoring of, or the re-
assignment of current employees; or the hiring or contracting of competent persons.
7.3
Awareness
Persons doing work under the organization’s control shall be aware of:
a) the information security policy;
b) their contribution to the effectiveness of the information security management system, including
the benefits of improved information security performance; and
c) the implications of not conforming with the information security management system
requirements.
7.4
Communication
The organization shall determine the need for internal and external communications relevant to the
information security management system including:
a) on what to communicate;
b) when to communicate;
c) with whom to communicate;
d) how to communicate.
7.5
Documented information