Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- A.5.1 Management direction for information security 0%
- A.6.1 Internal Organisation 0%
- A.6.2 Mobile devices and teleworking 0%
- A.7.1 Prior to employment 0%
- A.7.2 During employment 0%
- A.7.3 Termination and change of employment 0%
- A.8.1 Responibility for assets 0%
- A.8.2 Information classification 0%
- A.8.3 Media handling 0%
- A.9.1 Business requirements for access control 0%
- A.9.2 User access management 0%
- A.9.3 User responsibilities 0%
- A.9.4 System and application access control 0%
- A.10.1 Crypographic controls 0%
- A.11.1 Secure areas 0%
- A.11.2 Equipment 0%
- A.12.1 Operational procedures and responsibilities 0%
- A.12.2 Protection from malware 0%
- A.12.3 Backup 0%
- A.12.4 Logging and monitoring 0%
- A.12.5 Control of operational software 0%
- A.12.6 Technical vulnerability management 0%
- A.12.7 Information systems audit considerations 0%
- A.13.1 Network security management 0%
- A.13.2 Information transfer 0%
- A.14.1 Security requirements of information systems 0%
- A.14.2 Security in development and support processes 0%
- A.14.3 Test data 0%
- A.15.1 Information security in supplier relationships 0%
- A.15.2 Supplier service delivery management 0%
- A.16.1 Management of infosec incidents & improvements 0%
- A.17.1 Information security continuity 0%
- A.17.2 Redundancies 0%
- A.18.1 Compliance with legal and contractual requirements 0%
- A.18.2 Information security reviews 0%
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement