ISO27001 IMPLEMENTATION

ISO27001 IMPLEMENTATIONMore Details


Penetration-TestingISO/IEC 27001 is widely known, providing requirements for an information security management system (ISMS), though there are more than a dozen standards in the ISO/IEC 27000 family. Using them enables organizations of any kind to manage the security of assets such as financial information, intellectual property, employee details or information entrusted by third parties.

When it comes to keeping information assets secure, organizations can rely on the ISO/IEC 27000 family.

ISO is an independent, non-governmental organization made up of members from the national standards bodies of 165 countries.

Tags: ISO/IEC 27001, information security management system (ISMS), financial information, intellectual property.

content-sep2

Penetration-Testing
ISO Standard
The voting process is the key to consensus. If that’s achieved then the draft is on its way to becoming an ISO standard. If agreement isn’t reached then the draft will be modified further, and voted on again.
From first proposal to final publication, developing a standard usually takes about 3 years.

Tags: voting process, ISO standard, modified further, developing a standard.

content-sep2

Penetration-Testing
IT’S ALL IN THE NAME
Because ‘International Organization for Standardization’ would have different acronyms in different languages (IOS in English, OIN in French for Organisation internationale de normalisation), our founders decided to give it the short form ISO. ISO is derived from the Greek ‘isos’, meaning equal. Whatever the country, whatever the language, we are always ISO.

Tags: International Organization, Standardization, internationale, normalisation, Greek ‘isos’,

content-sep2

Our members play a vital role in how we operate, meeting once a year for a General Assembly that decides our strategic objectives. Our Central Secretariat in Geneva, Switzerland, coordinates the system and runs day-to-day operations, overseen by the Secretary-General.