Transcription of ISO 27001 Initial Assessment Report - UnderDefense
{{id}} {{{paragraph}}}
ISO 27001 Initial Assessment Report for [CLIENT] September 2018 TABLE OF CONTENTS Table of contents1 Executive Summary3 Our methodology4 Key stakeholders interviewed4 Maturity Level for each clause of ISO 270015 Conclusions6 RoadMap7 Recommendations ISMS activities10 Plan stage11 Do stage14 Check stage15 Act stage16 Recommendations Annex A controls17 Information Security Policies17 Organisation of Information Security18 Human resources security20 Asset management22 Inventory tools to install (as a recommendation )22 Access control24 Password managers to install (as a recommendation )26 Cryptography28 Physical and environmental security29 Operations security31 Antivirus tools to install (as a recommendation )32 Vulnerability management tools to install (as a recommendation )35 Communications security36 System acquisition, development and maintenance38 Supplier relationships41 Information security incident management43 Information security aspects of business continuity management45 Compliance47 Summary50 [CLIENT] Initial Assessment Report Page 1 of 49 EXECUTIVE SUMMARY [CLIENT]hasrequestedthatUnderDefense,asa nindependentandtrustedCyberSecuritypartn er, conductsanassessmentandanaly
iterative, team-based approach, in order complete all activities, resolve issues effectively and in time. The table can be treated as a project plan that contents 3 Stages, as presented in the table below, which ... [CLIENT] Initial Assessment Report Page 8 …
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}