Solved

Are there any guidelines or help to setting up ISO policies in compliance with ISO 27001:2005?

Posted on 2015-02-12
2
271 Views
Last Modified: 2015-02-13
Any help or Insight on complying with ISO 27001:2005 standard would be greatly appreciated. Does this standard specify any specific things we would need to implement? So far all I know is that the standard requires you to have policies in place but not sure if it sets them or just gives guidelines.
0
Comment
Question by:nsalabs
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 64

Accepted Solution

by:
btan earned 500 total points
ID: 40607434
Do kindly see my posting and it is better to align with 27001:2013 which is the most recent and all have to take reference instead of the older 2005. Extracted key pts below
- the toolkit http://www.iso27001security.com/html/iso27k_toolkit.html from the community which varied guidance document and checklist
- there is a pdf states the details going into the clauses, it has a nice table mapping of ISO/IEC 27001:2013 clauses to ISO/IEC 27001:2005.

http://www.experts-exchange.com/Security/Misc/Q_28388472.html

I also like to highlight 27001 as it is (in this good summary on the need to consider and do's pdf) is not only about compliance but include also
- establish a ready and updated understanding in your existing inventory of IT initiatives,
- ensure information availability and robustness in the control that are and should be in place
- follow consistent review cycle of ISMS implementation phases that is repeatable and governed with mgmt oversight.
0
 

Author Closing Comment

by:nsalabs
ID: 40608318
Thank you for all the info, this will get us on the right track.
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Part Two of the two-part Q&A series with MalwareTech.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question