ISO/IEC 27001:2013 defines 14
domains, which are also referred to as "security control categories,"
that are part of an information
security management system (ISMS) 27001 ISO. These domains are as follows:
Security Policy: Defines the
organization's information security policies and procedures, and establishes a
framework for managing information security risks.
Organization of Information
Security: Describes the management structure, roles, responsibilities, and
accountability for information security within the organization.
Asset Management: Identifies
the organization's information assets, assigns ownership and classification,
and establishes procedures for their handling and protection.
Human Resources Security:
Addresses the security aspects of the employment cycle, including recruitment,
training, awareness, and termination.
Physical and Environmental
Security: Ensures the security of the organization's physical assets, such as
buildings, equipment, and facilities.
Communications and Operations
Management: Covers the security of the organization's communications and
operational procedures, including networks, operations, and system development.
Access Control: Ensures that
access to information and information processing facilities is restricted to
authorized users and entities.
Information Systems
Acquisition, Development and Maintenance: Covers the security aspects of the
information systems life cycle, from planning and development to disposal.
Information Security Incident
Management: Establishes procedures for detecting, reporting, and responding to
information security incidents.
Business Continuity
Management: Covers the development and implementation of a business continuity
plan, including measures for protecting critical business functions and
information.
Compliance: Ensures that the
organization complies with relevant laws, regulations, and contractual
obligations related to information security.
Risk Management: Identifies
and assesses information security risks, and establishes controls to manage and
mitigate these risks.
Supplier Relationships: Covers
the security aspects of the organization's relationships with third-party
suppliers and vendors.
Information Security
Governance: Establishes a framework for the overall management of information
security within the organization, including policies, procedures, and metrics
for measuring and improving information security performance.
Comments
Post a Comment