Mandatory documents for ISO 27001:2013
IT Governance
JULY 27, 2018
Definition of security roles and responsibilities. Logs of user activities, exceptions, and security events. This will typically include: 7.1.2 An inventory of assets. Rules for the acceptable use of assets. Information classification scheme. Access control policy. Operating procedures for IT management. Supplier security policy.
Let's personalize your content