{tableName=glossary, name=ISO/IEC 27002 Scope, description=
ISO/IEC 27002 Scope is the scope of the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) 27002 standard. This standard provides guidance on the selection, implementation, and management of information security controls to protect and secure information assets. The scope of ISO/IEC 27002 covers the management of information security in organizations, including the selection, implementation, and management of information security controls. It is intended to cover all areas of information security, including physical security, personnel security, access control, network security, system security, application security, and data security. The scope of ISO/IEC 27002 is not limited to any particular industry or sector, but is applicable to any organization that stores, processes, transmits, or uses information assets. The scope of ISO/IEC 27002 is also applicable to any organization that is responsible for the security of its own information assets, as well as those of its customers, suppliers, and other stakeholders., topic=null, hs_path=iso-iec-27002-scope}--
{tableName=guides, name=ENISA National Capabilities Assessment Framework, description=
This guide provides an authoritative overview of the ENISA National Capabilities Assessment Framework. The guide is designed to help organizations assess their national cybersecurity capabilities, identify gaps, and develop strategies for addressing them, topic=null, hs_path=enisa-national-capabilities-assessment-framework}--
{tableName=comparison, name=SOC 2 vs GDPR, description=SOC 2 and GDPR compliance are essential for businesses to ensure data security and privacy. Learn the key differences between the two., topic=[{id=97620570514, createdAt=1673040885366, updatedAt=1683947939686, path='soc-2', name='
SOC 2 Compliance: A Comprehensive Guide', 1='{type=string, value=SOC 2}', 2='{type=string, value= Compliance
SOC 2 Compliance Guide: Learn the basics of SOC 2 compliance and how to ensure your organization meets the necessary standards. Get expert advice and resources to help you understand and implement the necessary}', 5='{type=string, value=This comprehensive guide provides an in-depth look at SOC 2, a set of standards used to assess the security, availability, processing integrity, confidentiality, and privacy of a service organization. It is designed to help service organizations understand the requirements of the SOC 2 framework, as well as how to implement and maintain the necessary controls to achieve compliance. This guide provides a detailed overview of the SOC 2 framework, including the five trust principles, the criteria used to evaluate those principles, and the process organizations must go through to become compliant. Additionally, this guide provides best practices for organizations to ensure they remain compliant, as well as advice on how to handle any non-compliance issues that may arise. With this guide, service organizations can gain a better understanding of the SOC 2 framework and how to use it to maintain the security and privacy of their customers' data.}'}], hs_path=soc-2-vs-gdpr}--
{tableName=glossary, name=Network Segregation, description=
Network Segregation is the process of separating different types of traffic on a network. It is used to ensure that sensitive information is kept secure by isolating it from other types of traffic. It can be accomplished in a variety of ways, including the use of virtual local area networks (VLANs), firewalls, and network access control lists (ACLs). Network segregation can also be used to limit the amount of traffic that is sent to or from certain areas of a network. This can help to reduce the risk of unauthorized access to sensitive information, as well as to improve network performance by reducing the amount of traffic that needs to be processed by the network., topic=null, hs_path=network-segregation}--
{tableName=glossary, name=ISO/IEC 27001 Surveillance Audit, description=
An ISO/IEC 27001 Surveillance Audit is a periodic review of an organization's information security management system (ISMS) to ensure it is operating effectively and is compliant with the requirements of the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) 27001 standard. This type of audit is conducted by an independent third-party auditor, who will assess the organization's ISMS against the requirements set out in the ISO/IEC 27001 standard. The audit will typically involve interviews with management and staff, a review of documents, and a review of the organization's processes and procedures. The audit will also include a review of the organization's security policies and procedures, as well as the implementation of security controls. The results of the audit will be reported to the organization, and any non-conformances or areas of improvement identified will be addressed by the organization., topic=[{id=97620570500, createdAt=1673040885276, updatedAt=1684824913644, path='iso-27001', name='
ISO 27001 Guide: A Comprehensive Guide', 1='{type=string, value=ISO 27001}', 2='{type=string, value=This guide provides a comprehensive overview of the ISO 27001 standard, including the requirements, implementation, and certification. Learn how to ensure your organization's information security is up to date and compliant.}', 5='{type=string, value=
This guide provides an authoritative and detailed overview of the ISO/IEC 27001 standard, which defines the requirements for an Information Security Management Systems (ISMS) associated with information security, cybersecurity and privacy protection.
Learn about the purpose and scope of the standard, the key requirements for an ISMS, how to implement and maintain an ISMS, how to establish an effective security risk management program, how to develop and implement security policies, how to implement controls to protect information and services and how to audit and review systems to ensure they meet the requirements of the standard.
This guide is an essential resource for anyone looking to understand and implement ISO 27001.
}', 15='{type=list, value=[{id=97620570500, name='ISO 27001'}]}'}], hs_path=iso-iec-27001-surveillance-audit}--
{tableName=comparison, name=ISO 27001 vs NIST SP 800-53, description=
Learn the key differences between ISO 27001 and NIST SP 800-53, two of the most popular security standards used to protect organizations from cyber threats., topic=[{id=97620570500, createdAt=1673040885276, updatedAt=1684824913644, path='iso-27001', name='
ISO 27001 Guide: A Comprehensive Guide', 1='{type=string, value=ISO 27001}', 2='{type=string, value=This guide provides a comprehensive overview of the ISO 27001 standard, including the requirements, implementation, and certification. Learn how to ensure your organization's information security is up to date and compliant.}', 5='{type=string, value=
This guide provides an authoritative and detailed overview of the ISO/IEC 27001 standard, which defines the requirements for an Information Security Management Systems (ISMS) associated with information security, cybersecurity and privacy protection.
Learn about the purpose and scope of the standard, the key requirements for an ISMS, how to implement and maintain an ISMS, how to establish an effective security risk management program, how to develop and implement security policies, how to implement controls to protect information and services and how to audit and review systems to ensure they meet the requirements of the standard.
This guide is an essential resource for anyone looking to understand and implement ISO 27001.
}', 15='{type=list, value=[{id=97620570500, name='ISO 27001'}]}'}], hs_path=iso-27001-vs-nist-sp-800-53}--
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75