ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls

Seeders : 17
Leechers : 3
Downloads : 1524
Size : 296.0 MB
Uploaded :07 Dec, 2023
Uploader :one

ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls

  • ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls296.0 MB
    • Get Bonus Downloads Here.url183.0 B
    • ~Get Your Files Here !
      • Bonus Resources.txt386.0 B
      • 01 - Introduction
        • 01 - Introduction to the Annex A controls.mp43.2 MB
        • 01 - Introduction to the Annex A controls.srt1.5 KB
      • 02 - 1. Governance
        • 01 - Policies for information security (Control 5.1).mp49.6 MB
        • 01 - Policies for information security (Control 5.1).srt9.0 KB
        • 02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp49.9 MB
        • 02 - Roles, responsibilities, and duties (Controls 5.2–5.4).srt7.4 KB
        • 03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp410.5 MB
        • 03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).srt8.5 KB
      • 03 - 2. Asset Management
        • 01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp410.3 MB
        • 01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).srt8.3 KB
        • 02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).mp47.8 MB
        • 02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).srt6.7 KB
      • 04 - 3. Information Protection
        • 01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp410.3 MB
        • 01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).srt8.1 KB
        • 02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp412.1 MB
        • 02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).srt9.7 KB
      • 05 - 4. Identity and Access Management
        • 01 - Access management (Controls 5.15–5.18).mp412.3 MB
        • 01 - Access management (Controls 5.15–5.18).srt8.7 KB
        • 02 - System and application access control (Controls 8.2–8.5).mp411.0 MB
        • 02 - System and application access control (Controls 8.2–8.5).srt8.1 KB
      • 06 - 5. Supplier Relationships Security
        • 01 - Supplier relationships security (Controls 5.19–5.21).mp49.2 MB
        • 01 - Supplier relationships security (Controls 5.19–5.21).srt7.9 KB
        • 02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp49.1 MB
        • 02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).srt6.5 KB
      • 07 - 6. Information Security Event Management
        • 01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp412.7 MB
        • 01 - Information security incident management (Controls 5.24–5.28, and 6.8).srt10.0 KB
        • 02 - Logging and monitoring (Controls 8.15–8.17).mp49.5 MB
        • 02 - Logging and monitoring (Controls 8.15–8.17).srt7.2 KB