Role Availability | Read-Only | Investigator | Analyst | Manager |
ISO/IEC 27001 provides guidance for implementing information security controls to achieve a consistent and reliable security program. The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) developed 27001 to provide requirements for an information security management system (ISMS).
This section includes the descriptions for ISO 27001 compliance templates on USM Anywhere:
- ISO 27001 A.6.1.4: Contact with Special Interest Groups
- ISO 27001 A.8.1.1: Inventory of Assets
- ISO 27001 A.8.1.2: Ownership of Assets
- ISO 27001 A.8.2.1: Classification of Information
- ISO 27001 A.8.2.2: Labeling of Information
- ISO 27001 A.11.2.6: Security of Equipment and Assets Off-Premises
- ISO 27001 A.12.2.1: Controls Against Malware
- ISO 27001 A.12.4.1: Event Logging
- ISO 27001 A.12.4.2 - Linux: Protection of Log Information
- ISO 27001 A.12.4.2 - Windows: Protection of Log Information
- ISO 27001 A.12.7.1: Information Systems Audit Controls
- ISO 27001 A.16.1.2: Reporting Information Security Events
- ISO 27001 A.16.1.4: Assessment of and decision on information security events
- ISO 27001 A.18.2.2: Compliance with Security Policies and Standards
- ISO 27001 A.18.2.3: Technical Compliance Review