Security Policies for ISO 27001 Security Standard

Posted on 2012-09-14
Last Modified: 2012-09-30

I have been asked to draft IT security policies for our company in order to acquire the ISO 27001 security standard.

To be honest I don't really know where to start.

Any pointers to online resources or policy templates would be welcome, but ultimately I like to understand what principles should be adopted in  practice.

Any help would be greatly appreciated

Question by:captain
    LVL 24

    Accepted Solution

    LVL 17

    Assisted Solution

    LVL 17

    Expert Comment

    The hard part is analyzing the organization and all of its processes to determine what is needed.
    LVL 32

    Author Comment

    I figured. I will need to check the links out on Monday when I am back at work.

    Thanks so far, I am sure there will be more. :)
    LVL 53

    Assisted Solution

    One of the big parts of ISO certification is the definition and implementation of audit procedures to insure that there are mechanism in place to enforce policy compliance within processes.

    The process need to have a self-checking, self-correcting mechanism.

    LVL 32

    Author Closing Comment

    Thanks all!

    We are now compiling a policy from the resource material provided

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Join & Write a Comment

    Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
    Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    745 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now