- 1、本文档被系统程序自动判定探测到侵权嫌疑,本站暂时做下架处理。
- 2、如果您确认为侵权,可联系本站左侧在线QQ客服请求删除。我们会保证在24小时内做出处理,应急电话:400-050-0827。
- 3、此文档由网友上传,因疑似侵权的原因,本站不提供该文档下载,只提供部分内容试读。如果您是出版社/作者,看到后可认领文档,您也可以联系本站进行批量认领。
查看更多
ISO27001InformationSecurityManagementSystem-System
ISO 27001 Information Security Management
System
Solution Overview: Symantec Managed Services
Overview
Due to growing information security risks, organizations must continually monitor and effectively manage the security of their
computing infrastructure. Further, organizations must ensure the confidentiality, integrity, and availability of their information
assets.
ISO 27001:2005 is a time-proven international standard of best practices published by the International Organization for
Standardization (ISO) for establishing, maintaining, and improving security programs for all organizations. An ISO 27001 based
Information Security Management System (ISMS) is a set of integrated processes that govern the management of security
program policies and procedures. Symantec? Managed Security Services has achieved and continues to achieve many benefits
from implementing an ISO 27001 based ISMS.
Designing and implementing an ISMS is a significant undertaking for security program managers. Because ISO 27001 is a multi-
layered security management standard, organizations must design consistent policies and practices in order to apply the
appropriate security controls required by ISO-27002 and also to prove compliance per ISO-27001 control objectives.
ISO 27001 Management Oversight for Consistency
Most organizations have a number of information security controls in place. However, many technical and process controls often
tend to be unrelated to each other, having been implemented as point solutions to address certain aspects of IT or data security
but not to an overall security program framework. ISO 27001 compliance strengthens an organizations security program
because it requires executive management sponsorship and approval of the ISMS policy and program. Executive management
oversight drives a consistent methodology for securing an organization’s information and infrastructure. The net result is that
management is responsible for assuring that their most important informati
您可能关注的文档
- CustomerApplicationPackage.PDF
- DB500112.PDF
- DCHMotorClub会员订购详情.PDF
- Demonstrationof10GbpsIDSIPSLivioRicciullilivio@.ppt
- DeterminantsofCorporateBorrowing.PDF
- DHHNZFCG2015-03.PDF
- DigitalRightsManagement(DRM)platformbasedonISO.doc
- DesignManufactureDeliver.ppt
- DINENISO13849-1is.PDF
- DirectoryandPersonRegistryImplementationDetails.ppt
最近下载
- 写给班主任的三十条建议.docx VIP
- 核反应堆设计软件:RELAP5二次开发_(17).RELAP5接口开发与数据交换.docx VIP
- 3.1网络改变世界 课件 2025-2026学年统编版道德与法治八年级上册.pptx VIP
- 三维超声评价子宫内膜容受性.pdf VIP
- 公基础知识(陕西省省情).pdf VIP
- (2025秋新版)二年级上册道德与法治全册教案.docx
- Viaton外研通单词机VT-D10使用指南.pdf
- 学校超市经营方案(完整).doc VIP
- 2024年秋季人教版七年级上册语文全册教学课件(考点精讲版).pptx
- 成都盒马鲜生末端物流配送管理与路径优化研究.doc VIP
文档评论(0)