Information Security
Skill packages tagged with “Information Security”
ISMS Internal Audit Report (Clause 9.2)
Draft and validate the ISO 27001 internal audit report: map findings to clauses, document NCs and OFIs, and ensure auditor impartiality so auditors do not audit their own work.
ISMS SoA & Risk Treatment Author
Guided elaboration of ISMS documentation for ISO/IEC 27001: context, risk assessment, risk treatment plan, Statement of Applicability (SoA), and security policies. Ensures every Annex A control has status and justification and flags missing risk treatment for unacceptable risks.
ISO 27001 Statement of Applicability
Build and validate the SoA (Clause 6.1.3): map 93 Annex A controls to In/Out with justification and implementation evidence. SoA mapping engine suggests inclusions from risk assessment; control justification audit ensures excluded controls have valid reasons and included controls link to active policies.
ISO 27001 Supplier Information Security Policy
Draft and validate supplier security requirements and annexes for ISO 27001:2022 Control 5.21. Tier-based Minimum Security Baseline (Cloud vs Janitorial), Right to Audit and Breach Notification validation.