{"id":1607,"date":"2018-11-29T12:23:28","date_gmt":"2018-11-29T12:23:28","guid":{"rendered":"https:\/\/iso27001.solutions\/?p=1607"},"modified":"2019-03-11T17:51:36","modified_gmt":"2019-03-11T17:51:36","slug":"explanation-of-iso-27001","status":"publish","type":"post","link":"https:\/\/ismsalliance.com\/trends\/about-iso-27001-standard\/explanation-of-iso-27001\/","title":{"rendered":"Explanation of ISO 27001"},"content":{"rendered":"

What is ISO 27001 ?<\/h2>\n

Information security systems are often regarded by organizations as simple checklists or policies and procedures that deny them a lot of things, far from the way they do their normal business. By sticking to these beliefs, organizations prevent themselves from properly building an ISMS (Information Security Management System) and achieving its full potential, either in operational and financial performance, or marketing reputation.<\/p>\n

Fortunately, there are many frameworks on the market that can help organizations to handle this situation, among them being ISO 27001:2013<\/strong>.<\/p>\n

Whether standing alone or integrated with another management system, such as ISO 9001 (Quality), ISO 22301 (Information Security), ISO 14001 (Environment), or OHSAS 18001 (Operational Health and Safety), the ISO 27001:2013 standard provides guidance and direction for how an organization, regardless of its size and industry, should manage information security and address information security risks, which can bring many benefits not only to the organization itself, but also to clients, suppliers, and other interested parties.<\/p>\n

But, for those unfamiliar with ISO standards or information security concepts, ISO 27001 may be confusing, so we developed this white paper to help you get inside this world.<\/p>\n

Sections 1 to 3 will cover the concepts of process, process approach, and PDCA cycle applicable to ISO management standards, as well as the most important definitions a beginner in information security should know.<\/p>\n

The main content of this white paper will follow the same order and numbering of the following clauses required to certify an ISMS against ISO 27001:2013:<\/strong><\/p>\n

4. Context of the organization
\n5. Leadership
\n6. Planning
\n7. Support
\n8. Operation
\n9. Performance evaluation
\n10. Improvement<\/p>\n

Additionally, the white paper also covers the content of Annex A, control objectives and security controls (safeguards), numbered from A.5 to A.18.
\nBesides all this explanatory information, you will find throughout this white paper references to other learning materials.<\/p>\n<\/div>

<\/div>
<\/div>
<\/div>
<\/div><\/div><\/div><\/div><\/div>
<\/a><\/span><\/div><\/div>
<\/div><\/div><\/div><\/div><\/div>

1. Process and process approach of ISO 27001<\/h2>\n<\/div>
<\/div>
<\/div><\/div>
<\/div>

1.1 Terms and definitions<\/h3>\n