How to manage changes in an ISMS according to ISO 27001 A.12.1.2
Changes are necessary in the information technology sector, mainly because every so often it is necessary to update servers, systems,...
Changes are necessary in the information technology sector, mainly because every so often it is necessary to update servers, systems, etc. But risks (seen from an information security point of view) arise when changes are...
What is a BYOD policy, and how can you easily write one using ISO 27001 controls?
One would expect that ISO 27001, the leading information security standard, would have strict requirements regarding BYOD. However, you would...
One would expect that ISO 27001, the leading information security standard, would have strict requirements regarding BYOD. However, you would be surprised – such requirements do not exist, and what’s more, BYOD is ever mentioned...
What are secure engineering principles in ISO 27001:2013 control A.14.2.5?
In my days of programming (big hosts and green/amber terminals, matrix printers…) we didn’t think so much about information security,...
In my days of programming (big hosts and green/amber terminals, matrix printers…) we didn’t think so much about information security, and especially not about secure engineering. Functional specifications were very simple, and acceptance criteria for...
ISO 27032 – What is it, and how does it differ from ISO 27001?
There are many standards in the ISO 27001 series, all related to security.  You probably don’t know much about ISO...
There are many standards in the ISO 27001 series, all related to security.  You probably don’t know much about ISO 27032:2012 because it is not as well-known as ISO 27001, ISO 27002, or ISO 22301,...
How to handle access control according to ISO 27001
Updated: March 29, 2023, according to the ISO 27001 2022 revision. Access control is usually perceived as a technical activity...
Updated: March 29, 2023, according to the ISO 27001 2022 revision. Access control is usually perceived as a technical activity that has to do with opening accounts, setting passwords, and similar stuff – and it...