menu
Explore
Calendar
Companies
Dashboard
Subscription
Help
filtres
New content
Consultant portal
Registration
EN
Français
Site identity
Stakeholders
CSR Strategy
values
labels
-
results
possible (
-
)
applicable (
-
)
Please complete the questionnaire to refine the potential results
Type of content
Nature of content
Consequences
Invite a stakeholder
Adresse mail
Issue the invitation
iso27001
Q
Information Security Policies
A set of information security policies must be defined, approved by management, disseminated and communicated to employees and third parties concerned. ...
Q
Information Security Policy Review
Policies must be reviewed at scheduled intervals or in the event of major changes to ensure their relevance, adequacy and effectiveness over time. ...
Q
Information Security in Project Management
Information security must be considered in project management, regardless of the type of project involved. ...
Q
Information Security Functions and Responsibilities
All information security responsibilities must be defined and assigned....
Q
Segregation of duties
Incompatible tasks and areas of responsibility must be segregated to limit the possibility of unauthorized or unintentional modification or misuse of the organization’s assets....
Q
Relations with the authorities
Appropriate relations with the competent authorities must be maintained....
Q
Relationships with specialized working groups
Appropriate relationships with interest groups, safety forums and professional associations must be maintained. ...
Q
Mobile Device Policy
A complementary security policy and measures shall be adopted to manage the risks arising from the use of mobile devices. ...
Q
Telework Policy
A complementary security policy and measures shall be implemented to protect information accessed, processed or stored on telework sites. ...
Q
Selection of candidates
Checks must be carried out on all candidates for employment in accordance with laws, regulations and ethics and be proportionate to the job requirements, the classification of accessible information and the risks identified. ...
Q
Terms and conditions of employment
Contractual agreements between employees and subcontractors must specify their responsibilities and those of the organization with respect to information security. ...
Q
Responsibilities of the management
Management must instruct all employees and subcontractors to apply the security rules in accordance with the policies and procedures in effect in the organization. ...
Q
Information Security Awareness, Learning and Training
All employees of the organisation and, where relevant, Subcontractors must receive appropriate awareness and training and receive regular updates to the organization’s policies and procedures that apply to their duties. ...
Q
Disciplinary process
There must be a formal disciplinary process known to all to take action against employees who have violated information security rules. ...
Q
Completion or modification of responsibilities associated with the contract of employment
The responsibilities and tasks related to the security of information which remain valid after the termination, term or modification of the employment contract, must be defined, communicated to the employee or to the sub-processing, and applied. ...
Q
Inventory of assets
The assets associated with the information and the means of processing the information must be identified and an inventory of these assets must be drawn up and kept up to date....
Q
Ownership of assets
The inventory assets must be assigned to an owner....
Q
Correct use of assets
The rules for the correct use of information, the assets associated with the information and the means of processing the information must be identified, documented and implemented....
Q
Return of assets
All employees, contractors and third party users must return all assets of the organization in their possession at the end of the period of employment, contract or agreement....
Q
Classification of information
Information shall be classified in terms of legal requirements, value, criticality and sensitivity to unauthorised disclosure or modification....
Q
Marking of information
An appropriate set of procedures for marking information must be developed and implemented in accordance with the classification plan adopted by the organization....
Q
Handling of assets
An appropriate set of procedures for marking information must be developed and implemented in accordance with the classification plan adopted by the organization....
Q
Management of removable media
An appropriate set of procedures for marking information must be developed and implemented in accordance with the classification plan adopted by the organization....
Q
Secure disposal or recycling of materials
All hardware components containing storage media must be checked to ensure that any sensitive data has been removed and that any licensed software has been securely uninstalled or overwritten, prior to disposal or reuse....
Q
Physical transfer of media
Media containing information must be protected against unauthorized access, misuse and tampering during transport....
Q
Access Control Policy
An access control policy shall be established, documented and reviewed based on business and information security requirements....
Q
Access to networks and network services
Users must have access only to the network and services for which they have been specifically authorised....
Q
User Registration and Unsubscribe
A formal user registration and de-registration process must be implemented to allow access rights to be granted....
Q
Distribution of user access
A formal process for distributing user access must be implemented to allow access rights to all types of users across services and systems....
Q
Management of privileges access rights
The assignment and use of privileges must be restricted and controlled....
Q
Management of secret user authentication information
The assignment of secret authentication information must be carried out as part of a formal management process....
Q
Review of user access rights
The assignment of secret authentication information must be carried out as part of a formal management process....
Q
Removal or adaptation of access rights
The rights of access to information and the means of processing information of all employees and third-party users must be abolished at the end of their period of employment, or adapted in the event of a change in the contract or agreement....
Q
Use of secret authentication information
Users must follow the organization’s practices for the use of secret authentication information....
Q
Restriction of access to information
Access to information and system application functions must be restricted in accordance with the access control policy....
Q
Secure the connection procedures
Where required by access control policy, access to systems and applications must be controlled by a secure login procedure....
Q
Password Management System
.Systems that manage passwords must be interactive and must ensure the quality of passwords....
Q
Using privileged utility programs
The use of utility programs to circumvent the measures of a system or application should be limited and closely monitored....
Q
Using privileged utility programs
Access to the program source code must be restricted....
Q
Policy on the Use of Cryptographic Measures
A policy for the use of cryptographic measures to protect information must be developed and implemented....
Q
Key Management
A policy on the use, protection and life of cryptographic keys must be developed and implemented throughout their lifecycle....
Q
Physical security perimeter
Security perimeters shall be defined and used to protect areas containing sensitive or critical information and means of information processing....
Q
Physical access control
Secure areas must be protected by adequate controls at the entrance to ensure that only authorized personnel are admitted....
Q
Securing offices, rooms and equipment
Physical security measures at offices, rooms and equipment must be designed and applied....
Q
Protection against external and environmental threats
Physical protection measures against natural disasters, malicious attacks or accidents must be designed and implemented....
Q
Working in secure areas
Procedures for working in secure areas should be designed and applied....
Q
Delivery and loading areas
Access points such as delivery and unloading areas and other points through which unauthorized persons may enter the premises shall be controlled and, if possible, isolated from the means of processing the information, so as to avoid unauthorized access....
Q
Location and protection of equipment
The equipment must be located and protected in a manner that minimizes the risks of environmental threats and hazards and opportunities for unauthorized access....
Q
General services
Equipment must be protected from power outages and other disturbances due to a failure of the general services....
Q
Security of the wiring
Electrical or telecommunications cables carrying data or supporting information services must be protected against interception or damage....
Q
Maintenance of equipment
Equipment must be maintained properly to ensure its continued availability and integrity....
Q
Disposal of assets
Equipment, information or software from the premises of the organisation must not be removed without prior authorisation....
Q
Security of equipment and assets outside premises
Security measures must be applied to equipment used outside the premises of the organisation, taking into account the different risks associated with off-site work....
Q
User equipment left unattended
Users must ensure that unattended equipment is properly protected....
Q
Clean Desktop and Locked Screen Policy
A clean office policy for paper documents and removable storage media, and a locked screen policy for information processing means must be adopted....
Q
Documented Operating Procedures
Operating procedures shall be documented and made available to all affected users....
Q
Change Management
Changes to the organization, business processes, systems and means of processing information that affect the security of information must be controlled....
Q
Sizing
Resource utilization shall be monitored and adjusted and projections of future design sizes shall be made to ensure the required system performance....
Q
Separation of development, test and operating equipment
The development, testing and operating environments must be segregated to reduce the risk of unauthorized access or change in the operating environment....
Q
Measures against malicious software
Detection, prevention and recovery measures, together with appropriate user awareness, must be implemented to protect against malware....
Q
Backup of the information
Backup copies of information, software and system images must be made and tested regularly in accordance with an agreed backup policy....
Q
Logging of events
Event logs recording user activities, exceptions, failures and security-related events must be created, maintained and verified regularly....
Q
Protection of logged information
The means of logging and logged information must be protected against the risk of unauthorized falsification or access....
Q
Administrator and Operator Logs
System Administrator and System Operator activities must be logged, protected and verified regularly....
Q
Synchronization of clocks
The clocks of all relevant information processing systems of an organisation or security domain shall be synchronized using a single time reference source....
Q
Installing software on operating systems
Procedures must be in place to control the installation of software on operating systems....
Q
Management of technical vulnerabilities
Information on technical vulnerabilities of operating information systems must be obtained in a timely manner, the organization’s exposure to these vulnerabilities must be assessed and appropriate actions taken to address the associated risk....
Q
Restrictions related to software installation
Rules governing the installation of software by users must be established and implemented....
Q
Measures relating to the audit of information systems
Audit requirements and activities involving audits on operating systems must be carefully planned and validated to minimize disruptions to business processes....
Q
Control of networks
Networks must be managed and controlled to protect information contained in systems and applications....
Q
Security of network services
For all network services, security mechanisms, service levels and management requirements, must be identified and incorporated into network service agreements, whether these services are provided in-house or outsourced....
Q
Partitioning of networks
The groups of information services, users and information systems must be separated on the networks....
Q
Information Transfer Policies and Procedures
Formal policies, procedures and transfer measures must be in place to protect information transfers through all types of telecommunications equipment....
Q
Information Transfer Agreements
Agreements must address the secure transfer of activity-related information between the organization and third parties....
Q
Electronic Messaging
Information passing through electronic messaging must be appropriately protected....
Q
Confidentiality or non-disclosure agreements
Confidentiality or non-disclosure commitment requirements must be identified, verified regularly and documented in accordance with the needs of the organization....
Q
Analysis and specification of information security requirements
Information security requirements must be incorporated into the requirements of new information systems or enhancements to existing information systems....
Q
Securing application services on public networks
Information related to enforcement services transmitted on public networks must be protected against fraudulent activities, contractual disputes, and unauthorized disclosure and modification....
Q
Protection of Enforcement Services Transactions
The information involved in transactions related to application services must be protected to prevent incomplete transmission, routing errors, unauthorized modification, unauthorized disclosure, unauthorized duplication of the message or its re-issue....
Q
Secure Development Policy
Software and system development rules must be established and applied to organizational developments....
Q
System Change Control Procedures
System changes within the development cycle should be controlled through formal procedures....
Q
Technical review of applications after operating platform change
When changes are made to the operating platforms, business critical applications must be verified and tested to ensure that there are no adverse effects on the activity or security....
Q
Restrictions on changes to software packages
Modifications to software packages should not be encouraged, limited to necessary changes and any changes should be strictly controlled....
Q
Systems Safety Engineering Principles
System security engineering principles shall be established, documented, maintained and applied to all information system implementation work....
Q
Secure development environment
Organisations should establish secure development environments for system development and integration tasks that encompass the entire development life cycle of the system, and ensure appropriate protection...
Q
Outsourced development
The organization must supervise and control the development activity of the outsourced system....
Q
System Safety Test
Security functionality tests must be performed during development...
Q
System Compliance Test
Compliance testing programs and associated criteria should be determined for new information systems, updates and releases....
Q
Protection of test data
Test data must be carefully selected, protected and controlled....
Q
Information Security Policy in Supplier Relations
Information security requirements to mitigate risks resulting from suppliers accessing the organization’s assets must be accepted by the supplier and documented....
Q
Security in agreements with suppliers
The applicable information security requirements must be established and agreed with each available provider, Process, store, communicate or provide components of the IT infrastructure for the information of the organization....
Q
IT products and services supply chain
Supplier agreements must include requirements for the handling of information security risks associated with the supply chain of IT products and services....
Q
Supplier Service Monitoring and Review
Organizations must monitor, audit and regularly audit the provision of services by providers....
Q
Managing changes in supplier services
Changes in supplier service provision, including the maintenance and improvement of existing information security policies, procedures and measures, must be managed taking into account the critical nature of the relevant information, systems and processes and the recurrence of risks....
Q
Responsibilities and Procedures
Responsibilities and procedures to ensure a timely, effective and relevant response must be established in the event of an information security incident....
Q
Reporting information security events
Information security events must be reported, as soon as possible, through the appropriate reporting channels....
Q
Reporting information security vulnerabilities
Information security events must be reported, as soon as possible, through the appropriate reporting channels....
Q
Assessment of information security events and decision-making
Information security events must be assessed and decided if they are to be classified as information security incidents....
Q
Response to Information Security Incidents
Information security incidents must be handled in accordance with documented procedures....
Q
Learning from Information Security Incidents
The knowledge gathered through the analysis and resolution of incidents should be used to reduce the likelihood or impact of subsequent incidents....
Q
Collection of evidence
The organization must define and implement procedures for identifying, collecting, acquiring and protecting information that can be used as evidence....
Q
Organization of Information Security Continuity
The organization must determine its information security and information security management continuity requirements in adverse situations, such as during a crisis or disaster....
Q
Implementation of Information Security Continuity
The organization shall establish, document, implement and maintain processes, procedures and measures to provide the required level of information security continuity during an adverse situation....
Q
Verify, review and assess information security continuity
The organization should verify information security continuity measures implemented at regular intervals to ensure that they are valid and effective in adverse situations....
Q
Availability of information processing facilities
Means of processing information must be implemented with sufficient redundancy to meet availability requirements....
Q
Verification of technical compliance
Information systems should be reviewed on a regular basis for compliance with the organization’s information security policies and standards....
Q
Identification of applicable legislation and contractual requirements
All applicable legal, statutory, regulatory and contractual requirements, as well as the approach taken by the organization to meet those requirements, must be explicitly defined, documented and updated for each information system and for the organization itself....
Q
Intellectual property rights
Appropriate procedures shall be implemented to ensure compliance with legal, regulatory and contractual requirements relating to intellectual property and the use of proprietary software licenses....
Q
Protection of records
Records must be protected from loss, destruction, tampering, unauthorized access and unauthorized releases, in accordance with legal, regulatory, contractual and business requirements....
Q
Protection of privacy and personal data
The protection of privacy and the protection of personal data must be guaranteed as required by applicable legislation or regulations, and contractual clauses where appropriate...
Q
Cryptographic Measurement Regulations
Cryptographic measures must be taken in accordance with applicable agreements, laws and regulations....
Q
Independent review of information security
Regular and independent reviews of the organization’s approach to managing and implementing information security (i.e., monitoring of security objectives, information security measures, policies, procedures and processes) must be carried out at defined intervals or when significant changes have oc...
Q
Compliance with security policies and standards
Officials must regularly check the compliance of the processing of information and the procedures for which they are responsible with the relevant policies, security standards and other security requirements....
Q
Disposal of Media
Media that are no longer needed must be disposed of securely, following formal procedures....
Connexion
To continue, please sign in for free.
sign in
Calculation in progress...