ISO 27001 is an international standard on how to manage information security. An enterprise that attains the ISO 27001 certification is considered to be able to provide safe and reliable information services. The information security system of the enterprise is recognized by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Security Center provides the feature of ISO 27001 compliance check. This feature helps your enterprise attain the ISO 27001 certification. This topic describes the check items that are supported by the feature. The topic also describes how to view the compliance check results.
Background information
Limits
All editions of Security Center support this feature. For more information about the features that each edition supports, see Features.
Supported check items
Annex | Section |
---|---|
A.8 Asset management | A.8.1.1 Inventory of assets |
A.8.1.2 Ownership of assets | |
A.8.2.1 Classification of information | |
A.8.2.2 Labeling of information | |
A. 9 Access control | A.9.1.2 Access to networks and network services |
A.9.2.1 User registration and deregistration | |
A.9.2.2 User access provisioning | |
A.9.2.3 Management of privileged access permissions | |
A.9.2.4 Management of confidential authentication information of users | |
A.9.2.5 Review of user access permissions | |
A.9.2.6 Removal or adjustment of access permissions | |
A.9.4.1 Limits on information access | |
A.9.4.2 Secure logon procedures | |
A.9.4.3 Password management system | |
A.9.4.4 Use of privileged utilities | |
A.10 Cryptography | A.10.1.1 Use of cryptographic mechanisms |
A.10.1.2 Key management | |
A.12 Operation security | A.12.1.3 Capacity management |
A.12.2.1 Protection against malware | |
A.12.3.1 Information backup | |
A.12.4.1 Event logging | |
A.12.4.2 Protection of logs | |
A.12.4.3 Administrator and operator logs | |
A.12.6.1 Management of technical vulnerabilities | |
A.12.7.1 Information system audit control mechanisms | |
A. 13 Communications security | A.13.1.1 Network control mechanisms |
A.13.1.2 Security of network services | |
A.13.1.3 Network isolation | |
A. 16 Information security incident management | A.16.1.4 Assessment of and decision on information security events |
A. 17 Information security of business continuity management | A.17.2.1 Availability of the assets that are used to process information |