|
SECTION I Evaluating and Measuring an Information Security Program |
|
|
|
Information Security Risk Assessment Model (ISRAM™) |
|
|
3 | (14) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
Relationship to Other Models and Standards |
|
|
5 | (2) |
|
|
7 | (1) |
|
Risk Assessment Relationship |
|
|
8 | (1) |
|
Information Security Risk Assessment Model (ISRAM) |
|
|
9 | (7) |
|
Scope and Type of Assessment |
|
|
10 | (1) |
|
|
11 | (2) |
|
|
13 | (1) |
|
|
13 | (1) |
|
Control Level of Effectiveness |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
Analysis and Final Report |
|
|
15 | (1) |
|
|
16 | (1) |
|
Global Information Security Assessment Methodology (GISAM™) |
|
|
17 | (32) |
|
GISAM and ISRAM Relationship |
|
|
18 | (1) |
|
|
19 | (2) |
|
Information Security Professional |
|
|
20 | (1) |
|
Information Security Professional Criteria |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (2) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (25) |
|
|
23 | (4) |
|
|
27 | (2) |
|
|
29 | (1) |
|
|
29 | (1) |
|
Key Risk Indicator (KRI) Controls |
|
|
30 | (2) |
|
|
32 | (1) |
|
|
33 | (3) |
|
|
36 | (1) |
|
|
37 | (2) |
|
|
39 | (1) |
|
Network Security Architecture Evaluation |
|
|
40 | (1) |
|
Example Network Security Architecture Criteria List |
|
|
41 | (2) |
|
|
43 | (3) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
Developing an Information Security Evaluation (ISE™) Process |
|
|
49 | (6) |
|
The Culmination of ISRAM and GISAM |
|
|
49 | (1) |
|
|
50 | (5) |
|
|
50 | (1) |
|
Step 2: Documentation Review |
|
|
51 | (1) |
|
Step 3: Negotiate Meeting Agenda |
|
|
51 | (1) |
|
|
52 | (1) |
|
Step 5: Analysis and Findings |
|
|
53 | (1) |
|
|
53 | (1) |
|
Step 7: Submit GISAM Final Report |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
55 | (16) |
|
KRI Security Baseline Controls |
|
|
55 | (1) |
|
|
56 | (1) |
|
Information Security Policy Document |
|
|
57 | (1) |
|
Management Commitment to Information Security |
|
|
58 | (1) |
|
Allocation of Information Security Responsibilities |
|
|
59 | (1) |
|
Independent Review of Information Security |
|
|
60 | (1) |
|
Identification of Risks Related to External Parties |
|
|
60 | (1) |
|
|
60 | (1) |
|
Classification Guidelines |
|
|
61 | (1) |
|
|
61 | (1) |
|
Information Security Awareness, Education, and Training |
|
|
62 | (1) |
|
|
62 | (1) |
|
Physical Security Perimeter |
|
|
62 | (1) |
|
Protecting against External and Environmental Threats |
|
|
63 | (1) |
|
Secure Disposal or Reuse of Equipment |
|
|
63 | (1) |
|
Documented Operating Procedures |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
Controls against Malicious Code |
|
|
64 | (1) |
|
Management of Removable Media |
|
|
65 | (1) |
|
Information Handling Procedures |
|
|
65 | (1) |
|
Physical Media in Transit |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
Security Requirements Analysis and Specification |
|
|
67 | (1) |
|
Policy on the Use of Cryptographic Controls |
|
|
67 | (1) |
|
Protection of System Test Data |
|
|
67 | (1) |
|
Control of Technical Vulnerabilities |
|
|
68 | (1) |
|
Reporting Information Security Events |
|
|
68 | (1) |
|
Including Information Security in the Business Continuity Process |
|
|
68 | (1) |
|
Identification of Applicable Legislation |
|
|
69 | (1) |
|
Data Protection and Privacy of Personal Information |
|
|
69 | (1) |
|
Technical Compliance Checking |
|
|
69 | (1) |
|
|
69 | (2) |
|
Background of the ISO/IEC 17799 Standard |
|
|
71 | (6) |
|
|
71 | (1) |
|
Internals of the Standard |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (2) |
|
|
73 | (1) |
|
Organization of Information Security |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
Physical and Environmental Security |
|
|
74 | (1) |
|
Communications and Operations Management |
|
|
74 | (1) |
|
|
74 | (1) |
|
Information Systems Acquisition, Development, and Maintenance |
|
|
74 | (1) |
|
Information Security Incident Management |
|
|
75 | (1) |
|
Business Continuity Management |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
ISO/IEC 17799:2005 Gap Analysis |
|
|
77 | (40) |
|
|
77 | (2) |
|
|
79 | (1) |
|
|
79 | (4) |
|
|
79 | (1) |
|
|
79 | (1) |
|
New Control Area: Risk Assessment |
|
|
79 | (1) |
|
Control Layout and Format |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (2) |
|
Information Security Policy |
|
|
84 | (1) |
|
Information security policy document |
|
|
84 | (1) |
|
Review of the information security policy |
|
|
84 | (1) |
|
Organization of Information Security |
|
|
85 | (3) |
|
|
85 | (1) |
|
Management commitment to information security |
|
|
85 | (1) |
|
Information security coordination |
|
|
85 | (1) |
|
Allocation of information security responsibilities |
|
|
85 | (1) |
|
Authorization process for information processing facilities |
|
|
86 | (1) |
|
Confidentiality agreements |
|
|
86 | (1) |
|
|
86 | (1) |
|
Contact with special interest groups |
|
|
86 | (1) |
|
Independent review of information security |
|
|
87 | (1) |
|
|
87 | (1) |
|
Identification of risks related to external parties |
|
|
87 | (1) |
|
Addressing security when dealing with customers |
|
|
87 | (1) |
|
Addressing security in third-party agreements |
|
|
87 | (1) |
|
|
88 | (1) |
|
Responsibility for Assets |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
Information Classification |
|
|
89 | (1) |
|
Classification guidelines |
|
|
89 | (1) |
|
Information labeling and handling |
|
|
89 | (1) |
|
|
89 | (3) |
|
|
89 | (1) |
|
Roles and responsibilities |
|
|
90 | (1) |
|
|
90 | (1) |
|
Terms and conditions of employment |
|
|
90 | (1) |
|
|
90 | (1) |
|
Management responsibilities |
|
|
90 | (1) |
|
Information security awareness, education, and training |
|
|
91 | (1) |
|
|
91 | (1) |
|
Termination or Change of Employment |
|
|
91 | (1) |
|
Termination responsibilities |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
Physical and Environmental Security |
|
|
92 | (2) |
|
|
92 | (1) |
|
Physical security perimeter |
|
|
92 | (1) |
|
|
92 | (1) |
|
Securing offices, rooms, and facilities |
|
|
93 | (1) |
|
Protecting against external and environmental threats |
|
|
93 | (1) |
|
|
93 | (1) |
|
Public access, delivery, and loading areas |
|
|
93 | (1) |
|
|
93 | (1) |
|
Equipment siting and protection |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
Security of equipment off-premises |
|
|
94 | (1) |
|
Secure disposal or reuse of equipment |
|
|
94 | (1) |
|
|
94 | (1) |
|
Communications and Operations Management |
|
|
94 | (7) |
|
Operational Procedures and Responsibilities |
|
|
95 | (1) |
|
Documented operating procedures |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
Separation of development, test, and operational facilities |
|
|
95 | (1) |
|
Third-Party Service Delivery Management |
|
|
96 | (1) |
|
|
96 | (1) |
|
Monitoring and review of third-party services |
|
|
96 | (1) |
|
Managing and review of third-party services |
|
|
96 | (1) |
|
System Planning and Acceptance |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
Protection Against Malicious and Mobile Code |
|
|
97 | (1) |
|
Controls against malicious code |
|
|
97 | (1) |
|
Controls against mobile code |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
Network Security Management |
|
|
97 | (1) |
|
|
98 | (1) |
|
Security of network services |
|
|
98 | (1) |
|
|
98 | (1) |
|
Management of removable computer media |
|
|
98 | (1) |
|
|
98 | (1) |
|
Information handling procedures |
|
|
98 | (1) |
|
Security of system documentation |
|
|
98 | (1) |
|
|
98 | (1) |
|
Information exchange policies and procedures |
|
|
99 | (1) |
|
|
99 | (1) |
|
Physical media in transit |
|
|
99 | (1) |
|
|
99 | (1) |
|
Business information systems |
|
|
99 | (1) |
|
Electronic Commerce Services |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
Publicly available systems |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
Protection of log information |
|
|
100 | (1) |
|
Administrator and operator logs |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (4) |
|
Business Requirements for Access Control |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
Review of user access rights |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
Unattended user equipment |
|
|
102 | (1) |
|
|
103 | (1) |
|
Policy on use of network services |
|
|
103 | (1) |
|
User authentication for external connections |
|
|
103 | (1) |
|
Equipment identification in the network |
|
|
103 | (1) |
|
Remote diagnostic port and configuration protection |
|
|
103 | (1) |
|
|
103 | (1) |
|
Network connection control |
|
|
103 | (1) |
|
|
103 | (1) |
|
Operating System Access Control |
|
|
104 | (1) |
|
|
104 | (1) |
|
User identification and authentication |
|
|
104 | (1) |
|
Password management system |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
Limitation of connection time |
|
|
104 | (1) |
|
Application and Information Access Control |
|
|
105 | (1) |
|
Information access restriction |
|
|
105 | (1) |
|
Sensitive system isolation |
|
|
105 | (1) |
|
Mobile Computing and Teleworking |
|
|
105 | (1) |
|
Mobile computing and communications |
|
|
105 | (1) |
|
|
105 | (1) |
|
Information Systems Acquisition, Development, and Maintenance |
|
|
105 | (4) |
|
Security Requirements of Information Systems |
|
|
106 | (1) |
|
Security requirements analysis and specification |
|
|
106 | (1) |
|
Correct Processing in Applications |
|
|
106 | (1) |
|
|
106 | (1) |
|
Control of internal processing |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
Policy on the use of cryptographic controls |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
Control of operational software |
|
|
107 | (1) |
|
Protection of system test data |
|
|
107 | (1) |
|
Access control to program source code |
|
|
107 | (1) |
|
Security in Development and Support Processes |
|
|
107 | (1) |
|
Change control procedures |
|
|
108 | (1) |
|
Technical review of applications after operating system changes |
|
|
108 | (1) |
|
Restrictions on changes to software packages |
|
|
108 | (1) |
|
|
108 | (1) |
|
Outsourced software development |
|
|
108 | (1) |
|
Technical Vulnerability Management |
|
|
108 | (1) |
|
Control of technical vulnerabilities |
|
|
108 | (1) |
|
Information Security Incident Management |
|
|
109 | (1) |
|
Reporting Information Security Events and Weaknesses |
|
|
109 | (1) |
|
Reporting information security events |
|
|
109 | (1) |
|
Reporting security weaknesses |
|
|
109 | (1) |
|
Management of Information Security Incidents and Improvements |
|
|
109 | (1) |
|
Responsibilities and procedures |
|
|
109 | (1) |
|
Learning from information security incidents |
|
|
110 | (1) |
|
|
110 | (1) |
|
Business Continuity Management |
|
|
110 | (1) |
|
Information Security Aspects of Business Continuity Management |
|
|
110 | (1) |
|
Including information security in the business continuity management process |
|
|
110 | (1) |
|
Business continuity and risk assessment |
|
|
110 | (1) |
|
Developing and implementing continuity plans including information security |
|
|
111 | (1) |
|
Business continuity planning framework |
|
|
111 | (1) |
|
Testing, maintaining, and reassessing business continuity plans |
|
|
111 | (1) |
|
|
111 | (2) |
|
Compliance with Legal Requirements |
|
|
111 | (1) |
|
Identification of applicable legislation |
|
|
111 | (1) |
|
Intellectual property rights (IPR) |
|
|
111 | (1) |
|
Protection of organizational records |
|
|
112 | (1) |
|
Data protection and privacy of personal information |
|
|
112 | (1) |
|
Prevention of misuse of information processing facilities |
|
|
112 | (1) |
|
Regulation of cryptographic controls |
|
|
112 | (1) |
|
Compliance with Security Policies and Standards and Technical Compliance |
|
|
112 | (1) |
|
Compliance with security policy and standards |
|
|
112 | (1) |
|
Technical compliance checking |
|
|
112 | (1) |
|
Information Systems Audit Considerations |
|
|
113 | (1) |
|
Information systems audit controls |
|
|
113 | (1) |
|
Protection of information systems audit tools |
|
|
113 | (1) |
|
|
113 | (4) |
|
SECTION II Analysis of ISO/IEC 17799:2005 (27002) Controls |
|
|
|
|
117 | (8) |
|
Information Security Policy |
|
|
118 | (4) |
|
Information security policy document |
|
|
119 | (2) |
|
Review of the information security policy |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (2) |
|
Organization of Information Security |
|
|
125 | (8) |
|
|
126 | (4) |
|
Management commitment to information security |
|
|
126 | (1) |
|
Information security coordination |
|
|
127 | (1) |
|
Allocation of information security responsibilities |
|
|
127 | (1) |
|
Authorization process for information processing facilities |
|
|
128 | (1) |
|
Confidentiality agreements |
|
|
128 | (1) |
|
|
129 | (1) |
|
Contact with special interest groups |
|
|
129 | (1) |
|
Independent review of information security |
|
|
130 | (1) |
|
|
130 | (2) |
|
Identification of risks related to external parties |
|
|
130 | (1) |
|
Addressing security when dealing with customers |
|
|
131 | (1) |
|
Addressing security in third-party agreements |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (6) |
|
Responsibility for Assets |
|
|
133 | (2) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
Information Classification |
|
|
135 | (2) |
|
Classification of guidelines |
|
|
135 | (1) |
|
Information labeling and handling |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (2) |
|
|
139 | (8) |
|
|
139 | (2) |
|
Roles and responsibilities |
|
|
139 | (1) |
|
|
140 | (1) |
|
Terms and conditions of employment |
|
|
141 | (1) |
|
|
141 | (3) |
|
Management responsibilities |
|
|
142 | (1) |
|
Information security awareness, education, and training |
|
|
142 | (1) |
|
|
143 | (1) |
|
Termination or Change of Employment |
|
|
144 | (1) |
|
Termination responsibilities |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
Physical and Environmental Security |
|
|
147 | (8) |
|
|
147 | (3) |
|
Physical security perimeter |
|
|
147 | (1) |
|
|
148 | (1) |
|
Securing offices, rooms, and facilities |
|
|
148 | (1) |
|
Protecting against external and environmental threats |
|
|
148 | (1) |
|
|
149 | (1) |
|
Public access, delivery, and loading areas |
|
|
149 | (1) |
|
|
150 | (3) |
|
Equipment siting and protection |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
Security of equipment off-premises |
|
|
152 | (1) |
|
Secure disposal or reuse of equipment |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
Communications and Operations Management |
|
|
155 | (18) |
|
Operational Procedures and Responsibilities |
|
|
155 | (2) |
|
Documented operating procedures |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
Separation of development, test, and operational facilities |
|
|
157 | (1) |
|
Third-Party Service Delivery Management |
|
|
157 | (2) |
|
|
158 | (1) |
|
Monitoring and review of third-party services |
|
|
158 | (1) |
|
Managing changes to third-party services |
|
|
158 | (1) |
|
System Planning and Acceptance |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
Protection against Malicious and Mobile Code |
|
|
160 | (1) |
|
Controls against malicious code |
|
|
160 | (1) |
|
Controls against mobile code |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
Network Security Management |
|
|
161 | (1) |
|
|
162 | (1) |
|
Security of network services |
|
|
162 | (1) |
|
|
162 | (2) |
|
Management of removable media |
|
|
162 | (1) |
|
|
163 | (1) |
|
Information handling procedures |
|
|
163 | (1) |
|
Security of system documentation |
|
|
164 | (1) |
|
|
164 | (2) |
|
Information exchange policies and procedures |
|
|
164 | (1) |
|
|
165 | (1) |
|
Physical media in transit |
|
|
165 | (1) |
|
|
166 | (1) |
|
Business information systems |
|
|
166 | (1) |
|
Electronic Commerce Services |
|
|
166 | (2) |
|
|
167 | (1) |
|
|
167 | (1) |
|
Publicly available information |
|
|
168 | (1) |
|
|
168 | (3) |
|
|
168 | (1) |
|
|
169 | (1) |
|
Protection of log information |
|
|
169 | (1) |
|
Administrator and operator logs |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (2) |
|
|
173 | (12) |
|
Business Requirements for Access Control |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
Review of user access rights |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
Unattended user equipment |
|
|
176 | (1) |
|
Clear desk and clear screen policy |
|
|
176 | (1) |
|
|
176 | (3) |
|
Policy on use of network services |
|
|
177 | (1) |
|
User authentication for external connections |
|
|
177 | (1) |
|
Equipment identification in networks |
|
|
177 | (1) |
|
Remote diagnostic and configuration port protection |
|
|
178 | (1) |
|
|
178 | (1) |
|
Network connection control |
|
|
178 | (1) |
|
|
179 | (1) |
|
Operating System Access Control |
|
|
179 | (3) |
|
|
180 | (1) |
|
User identification and authentication |
|
|
180 | (1) |
|
Password management system |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
Limitation of connection time |
|
|
181 | (1) |
|
Application and Information Access Control |
|
|
182 | (1) |
|
Information access restriction |
|
|
182 | (1) |
|
Sensitive system isolation |
|
|
182 | (1) |
|
Mobile Computing and Teleworking |
|
|
183 | (1) |
|
Mobile computing and communications |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
Information Systems Acquisition, Development, and Maintenance |
|
|
185 | (10) |
|
Security Requirements of Information Systems |
|
|
185 | (1) |
|
Security requirements analysis and specification |
|
|
185 | (1) |
|
Correct Processing in Applications |
|
|
186 | (1) |
|
|
186 | (1) |
|
Control of internal processing |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
Policy on the use of cryptographic controls |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (2) |
|
Control of operational software |
|
|
188 | (1) |
|
Protection of system test data |
|
|
189 | (1) |
|
Access control to program source code |
|
|
189 | (1) |
|
Security in Development and Support Processes |
|
|
190 | (2) |
|
Change control procedures |
|
|
190 | (1) |
|
Technical review of applications after operating system changes |
|
|
190 | (1) |
|
Restrictions on changes to software packages |
|
|
190 | (1) |
|
|
191 | (1) |
|
Outsourced software development |
|
|
191 | (1) |
|
Technical Vulnerability Management |
|
|
192 | (1) |
|
Control of technical vulnerabilities |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (2) |
|
Information Security Incident Management |
|
|
195 | (4) |
|
Reporting Information Security Events and Weaknesses |
|
|
195 | (2) |
|
Reporting information security events |
|
|
195 | (1) |
|
Reporting security weaknesses |
|
|
196 | (1) |
|
Management of Information Security Incidents and Improvements |
|
|
197 | (1) |
|
Responsibilities and procedures |
|
|
197 | (1) |
|
Learning from information security incidents |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
Business Continuity Management |
|
|
199 | (4) |
|
Information Security Aspects of Business Continuity Management |
|
|
199 | (2) |
|
Including information security in the business continuity management process |
|
|
199 | (1) |
|
Business continuity and risk assessment |
|
|
199 | (1) |
|
Developing and implementing continuity plans including information security |
|
|
200 | (1) |
|
Business continuity planning framework |
|
|
200 | (1) |
|
Testing, maintaining, and reassessing business continuity plans |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (2) |
|
|
203 | (6) |
|
Compliance with Legal Requirements |
|
|
203 | (2) |
|
Identification of applicable legislation |
|
|
203 | (1) |
|
Intellectual property rights (IPR) |
|
|
203 | (1) |
|
Protection of organizational records |
|
|
204 | (1) |
|
Data protection and privacy of personal information |
|
|
204 | (1) |
|
Prevention of misuse of information processing facilities |
|
|
204 | (1) |
|
Regulation of cryptographic controls |
|
|
205 | (1) |
|
Compliance with Security Policies and Standards, and Technical Compliance |
|
|
205 | (1) |
|
Compliance with security policies and standards |
|
|
205 | (1) |
|
Technical compliance checking |
|
|
206 | (1) |
|
Information Systems Audit Considerations |
|
|
206 | (1) |
|
Information systems audit controls |
|
|
206 | (1) |
|
Protection of information systems audit tools |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (2) |
|
|
209 | (2) |
|
ISO Standards Cited in ISO/IEC 17799:2005 |
|
|
209 | (2) |
|
|
211 | (2) |
|
|
211 | (2) |
Index |
|
213 | |