
Statement of Applicability (Soa) ISO/IEC 27001:2013
The following article is a sample template that can be used to satisfy the Statement of Applicability requirement of the ISO 27001 standard. Legend:REG –
Zero Trust Security solutions at a fraction of the cost of typical managed security providers.
The following article is a sample template that can be used to satisfy the Statement of Applicability requirement of the ISO 27001 standard. Legend:REG –
This article contains a summary of all mandatory and non-mandatory policies required by ISO 27001.
Threat modeling is the process of adopting a strategic, risk-based approach to identifying and resolving your security blind spots.
Quick overview of the CIS (Community Defense Model) CDM.
Formerly the SANS Critical Security Controls (SANS Top 20) these are now officially called the CIS Critical Security Controls (CIS Controls).
The NIST incident response life-cycle breaks incident response down into four main phases: Preparation; Detection and Analysis; Containment, Eradication, and Recovery; and Post-Event Activity.
The blog post provides a short description of the ISO 27001 Annex A – controls.
NIST Cyber Security Framework (CSF) gives private sector organisations a framework of policies and controls to help prevent attacks from cyber criminals and detect and respond to ones that do gain access.
Get email alerts when we publish new blog articles!