Information Security

Skill packages tagged with “Information Security”

ISMS Internal Audit Report (Clause 9.2)

Draft and validate the ISO 27001 internal audit report: map findings to clauses, document NCs and OFIs, and ensure auditor impartiality so auditors do not audit their own work.

    Learn More
    ISMS SoA & Risk Treatment Author

    Guided elaboration of ISMS documentation for ISO/IEC 27001: context, risk assessment, risk treatment plan, Statement of Applicability (SoA), and security policies. Ensures every Annex A control has status and justification and flags missing risk treatment for unacceptable risks.

      Learn More
      ISO 27001 Statement of Applicability

      Build and validate the SoA (Clause 6.1.3): map 93 Annex A controls to In/Out with justification and implementation evidence. SoA mapping engine suggests inclusions from risk assessment; control justification audit ensures excluded controls have valid reasons and included controls link to active policies.

        Learn More
        ISO 27001 Supplier Information Security Policy

        Draft and validate supplier security requirements and annexes for ISO 27001:2022 Control 5.21. Tier-based Minimum Security Baseline (Cloud vs Janitorial), Right to Audit and Breach Notification validation.

          Learn More

          Ready to let your expertise drive the workflow?

          Stop wrestling with rigid templates and complex tooling. Write your process in markdown, let the agent handle the rest.

          Get Started