Part 2: The Protection Strategy – ISO/IEC 27001/02 Design and Implementation
Part 2, consisting of Chapters 3 to 7, delves into the heart of the ISO/IEC 27001/27002 standards, offering an in-depth understanding of controls, risk management, and the developmental stages of an ISMS. Chapter 3 navigates through the controls laid out in ISO 27001/27002, illustrating how they can be interpreted and applied based on business context. Chapter 4 dives into risk assessment and management and the crucial elements of the ISO 27001 framework, and introduces the role of a risk register. In Chapter 5, you’ll journey through the process of developing an ISMS, learning how to customize control implementation to a business’s specific context. Chapter 6 underscores the significance of a comprehensive incident management plan to maintain information security. Finally, Chapter 7 provides practical insights via real-world case studies concerning certification, a Statement of Applicability...