{"id":3128,"date":"2017-05-16T09:34:56","date_gmt":"2017-05-16T09:34:56","guid":{"rendered":"http:\/\/wiki.davelevy.info\/?p=3128"},"modified":"2017-05-16T09:37:24","modified_gmt":"2017-05-16T09:37:24","slug":"iso-27001","status":"publish","type":"post","link":"https:\/\/davelevy.info\/wiki\/iso-27001\/","title":{"rendered":"ISO 27001"},"content":{"rendered":"<p>On ISO 27001, much of my work now requires an understanding of this standard, the gold plated standard for IT security, well I say gold plated, more accurately reasonable endeavours. I believe that it will become an essential part of the defence to charges that one&#8217;s failed to adequately protect data. Nothing new here yet!<!--more--><\/p>\n<p>Here&#8217; the links on the standard<\/p>\n<ol>\n<li>http:\/\/www.iso27001security.com\/index.html<\/li>\n<li>http:\/\/www.iso27001security.com\/html\/27002.html#Section12<\/li>\n<li>https:\/\/www.iso.org\/standard\/54534.html<\/li>\n<li>https:\/\/en.wikipedia.org\/wiki\/ISO\/IEC_27001:2013<\/li>\n<li>http:\/\/www.iso27001security.com\/html\/27002.html<\/li>\n<li>http:\/\/gender.govmu.org\/English\/Documents\/activities\/gender%20infsys\/AnnexIX1302.pdf<\/li>\n<li>https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:27003:ed-2:v1:en<\/li>\n<\/ol>\n<p>Today, I am focussing on Operations Security<\/p>\n<ol>\n<li>http:\/\/iso27001guide.com\/annex-a\/operations-security\/protection-from-malware\/iso-27001-protection-from-malware\/<\/li>\n<\/ol>\n<p>And Applications Security, looking at logging and monitoring<\/p>\n<ol>\n<li>http:\/\/www.iso27001security.com\/html\/27034.html<\/li>\n<li>https:\/\/advisera.com\/27001academy\/blog\/2015\/11\/23\/logging-and-monitoring-according-to-iso-27001-a-12-4\/<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>On ISO 27001, much of my work now requires an understanding of this standard, the gold plated standard for IT security, well I say gold plated, more accurately reasonable endeavours. I believe that it will become an essential part of the defence to charges that one&#8217;s failed to adequately protect data. Nothing new here yet!<\/p>\n","protected":false},"author":1,"featured_media":3129,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_share_on_mastodon":"0"},"categories":[4,3],"tags":[912,1112,911],"class_list":["post-3128","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-i-t","category-technology","tag-i-t","tag-iso27001","tag-technology"],"share_on_mastodon":{"url":"","error":""},"jetpack_featured_media_url":"https:\/\/davelevy.info\/wiki\/wp-content\/uploads\/2017\/05\/iso27001-lozenge-w650.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts\/3128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/comments?post=3128"}],"version-history":[{"count":1,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts\/3128\/revisions"}],"predecessor-version":[{"id":3130,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/posts\/3128\/revisions\/3130"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/media\/3129"}],"wp:attachment":[{"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/media?parent=3128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/categories?post=3128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/davelevy.info\/wiki\/wp-json\/wp\/v2\/tags?post=3128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}