ISO 27001 Controls: Mastering ISO 27001: A Step-by-Step Guide to Effective Implementation and Auditing

·
· Packt Publishing Ltd
Ebook
249
Pages
Ratings and reviews aren’t verified  Learn More

About this ebook

A complete guide to ISO 27001 compliance, focusing on effective implementation and auditing of security controls in organizations. Learn how to safeguard your information system and ensure adherence to international standards.Key Features
  • A comprehensive guide to ISO 27001 control implementation.
  • Practical steps for auditing information security management systems.
  • Real-world applications of organizational, physical, and technological security controls.
Book DescriptionThis guide offers a comprehensive approach to implementing and auditing ISO 27001 controls, providing clear steps for establishing a robust Information Security Management System (ISMS). It is designed to help organizations navigate the complexities of meeting international security standards while ensuring the protection of sensitive information. The book covers every aspect of ISO/IEC 27001, from the foundational principles to practical applications of organizational, physical, and technological controls. Each chapter is carefully structured to explain the implementation of specific controls, focusing on real-world scenarios and offering actionable advice for security professionals. With detailed instructions and clear examples, readers will gain a deep understanding of the ISO 27001 framework and how to align their organizations with best practices. In addition to control implementation, the book emphasizes ongoing compliance and risk management strategies. It highlights critical areas such as incident management, supplier relationships, and data protection, ensuring readers can address security challenges at all levels. Whether new to ISO 27001 or looking to refine an existing ISMS, this book provides the tools necessary for successful information security management and compliance auditing.What you will learn
  • Develop skills to audit the security measures within an organization.
  • Gain expertise in managing physical and technological controls.
  • Implement and monitor information security policies effectively.
  • Understand how to handle and mitigate security incidents.
  • Master compliance strategies for information security audits.
  • Learn the best practices for risk management in information security.
Who this book is for

This book is ideal for security managers, compliance officers, and auditors who are responsible for ensuring the effective implementation and auditing of ISO/IEC 27001 controls within an organization. A basic understanding of information security principles and the ISO 27001 framework is beneficial, though not mandatory. The book offers a structured approach, making it accessible to both beginners and professionals with some experience in auditing or information security.

About the author

IT Governance Publishing (ITGP) is the world's only specialist IT governance publisher. We produce books, toolkits and training aids on a wide range of topics including information security, IT governance, information risk, compliance, cyber security, IT service management, project management and management system standards.

Bridget Kenyon is the Chief Information Security Officer for SSCL. She is responsible for managing strategy and information security activities for the whole organisation, including internal and customer-facing elements. In parallel to her main role, Bridget has been on the ISO editing team for ISMS standards since 2006; she has served as Lead Editor for ISO/IEC 27001:2022 and ISO/IEC 27014:2020. Joining DERA in 2000 to work on network vulnerabilities, Bridget discovered her passion for information and cyber security. Following this, she has been a Qualified Security Assessor against PCI DSS, Head of Information Security for UCL, and has held operational and consultancy roles in both industry and academia. She is a member of the UK Advisory Council for ISC2, and a Fellow of the Chartered Institute of Information Security. Bridget's interests lie in finding the edges of security which you can peel up, and the human aspects of system vulnerability. She's the sort of person who will always have a foot in both the technical and strategy camps. She enjoys helping people to find solutions to thorny problems, and strongly believes that cyber and information security are fundamental to resilient business operations, not “nice to haves".

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.