Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Keross: ISO 27001 Compliance Checklist – Best Practices

February 2010 by Keross

ISO 27001’s comprehensive scope and broad adoption base have made it the de facto international information security standard. As the backbone of a well-executed information security program, the standard can significantly increase managerial confidence in information assets. In addition, the ISO 27001 certification option gives companies a rare and powerful tool for reaping market benefits from internal security initiatives.

ISO 27001’s strength as a robust standard can also be its greatest challenge, however. Companies seeking to develop an ISO-compliant Information Security Management System (ISMS) must consider and potentially meet more than 130 discrete security control objectives listed in the standard. But building controls is only half the battle: the real work lies in the ongoing maintenance, tracking, and assessment of complex control implementations.

IKON PQM has been designed by auditors for auditors to help companies more efficiently manage and maintain ISO 27001 programs. Built on a globally accessible SaaS platform, PQM provides powerful automation and built-in expertise to reduce the cost and complexity of control selection, operational assessment, and real-time monitoring of critical operational functions.

PQM is uniquely designed to support both targeted compliance programs and the integration of programmatic audit and control initiatives into a holistic information governance practice. Incorporating the T2P Rationalized Operational Control KnowledgebaseTM (ROCK), PQM categorizes, ranks, and weights a harmonized set of hundreds of operational control objectives. Managers can choose, sort, and track controls just for ISO 27001; compare existing information security practices to IKON’s rationalized list of operational best practices; and easily identify new opportunities for process efficiency across disparate security audit and operational programs.

Review some of our ISO 27001 Audit Checklist :

ISO 27001 Mapping Area and Departments Checklist

ISO 27001 IT Security Support and Implementation Checklist

ISO 17799 Network Vulnerability Assessment Evaluation Checklist


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts