{"id":1651,"date":"2018-11-29T14:40:42","date_gmt":"2018-11-29T14:40:42","guid":{"rendered":"https:\/\/iso27001.solutions\/?p=1651"},"modified":"2019-03-11T17:53:30","modified_gmt":"2019-03-11T17:53:30","slug":"how-to-identify-interested-parties-according-to-iso-27001","status":"publish","type":"post","link":"https:\/\/ismsalliance.com\/trends\/iso-27001-implementation\/how-to-identify-interested-parties-according-to-iso-27001\/","title":{"rendered":"How to identify interested parties according to ISO 27001"},"content":{"rendered":"

Who are the Interested Parties?<\/h2>\n

One of the hot questions these days is related to clause 4.2 in ISO 27001 \u2013 Understanding the needs and expectations of interested parties.<\/p>\n

Actually, their identification is not so complicated, and it gives crucial input for developing your information security management system (ISMS).<\/p>\n<\/div>

<\/div>
<\/div>
<\/div>
<\/div><\/div><\/div><\/div><\/div>
<\/a><\/span><\/div><\/div>
<\/div><\/div><\/div><\/div><\/div>
<\/div>
<\/div>
<\/div>

Who are interested parties?<\/h2>\n<\/div>
<\/div>
<\/div><\/div>
<\/div>

Let\u2019s start with understanding what interested parties are \u2013 they are nothing else but stakeholders, i.e., persons or organizations that can influence your information security, or persons or organizations that can be affected by your information security<\/a>.<\/p>\n

Typically, interested parties could include:<\/strong><\/p>\n