Posts

Showing posts from April, 2020

Introduction to Cloud Computing and AWS

Image
You will learn into this regarding  cloud computing  and their six advantages as well as types of cloud computing in detail. What is Cloud Computing? Cloud computing is that the on-demand delivery of compute power, database storage, applications, and other IT resources through a cloud services platform via the web with pay-as-you-go pricing. Whether you’re running applications that share photos to many mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low-cost  IT resources . With cloud computing, you don’t got to make large upfront investments in hardware and spend tons of your time on the work of managing that hardware. Instead, you’ll provision precisely the right type and size of computing resources you would like to power your newest bright idea or operate your IT department. you’ll access as many resources as you would like , almost instantly, and only buy what you emp...

Certified in Risk and Information Systems Control | CRISC | Infosavvy

Image

ISO 27001 Lead Auditor Training And Certification ISMS | Infosavvy

Image

COBIT5 2019 Foundation #ONLINE Training | Infosavvy

Image

ISO 27001 Clause 7.5 Documented information Implementation Guideline

Image
Required activity The organization includes documented information within the ISMS as directly required by  ISO/IEC 27001 , also as determined by the organization as being necessary for the effectiveness of the ISMS. Implementation Guideline Documented information is required to define and communicate information security objectives, policy, guidelines, instructions, controls, processes, procedures, and what persons or groups of individuals are expected to try to do and the way they’re expected to behave. Documented information is additionally needed for audits of the ISMS and to take care of a stable ISMS when persons in key roles change. Further, documented information is required for recording actions, decisions and outcome(s) of ISMS processes and  knowledge security controls . Documented information can contain: Information about information security objectives, risks, requirements and standards; Information about processes and procedures to be followed; ...

ISO 27001 Implementation Guideline for Clause 7.2, Clause 7.3 & Clause 7.4

Image
Competence Required activity The organization determines the competence of persons needed for  information security  performance and ensures that the persons are competent. Implementation Guidance Competence is that the ability to use knowledge and skills to realize intended results. it’s influenced by knowledge, experience and wisdom. Competence are often specific (e.g. about technology or specific management areas like risk management) or general (e.g. soft skills, trustworthiness, and basic technological and managerial subjects). Competence  relates to persons that employment in check of the organization. this suggests that competence should be managed for persons that are employees of the organization and for people as required. Acquisition of upper or new competence and skills are often achieved both internally and externally through experience, training (e.g. courses, seminars and workshops), mentoring, hiring or contracting external persons. For c...

ISO 27001 Clause 6.1.3 Information security risk treatment

Image
Information security risk treatment Required activity The organization defines and applies an information security risk treatment process.   Implementation Guideline Information security risk treatment is that the overall process of choosing risk treatment options, determining appropriate controls to implement such options, formulating a risk treatment plan and obtaining approval of the Risk treatment plan by the Risk owner(s).All steps of the knowledge security risk treatment process also because the results of its application are retained by the organization as documented information. Information security risk treatment options Risk treatment options are: Avoiding the Risk by deciding to not start or continue with the activity that provides rise to the Risk or by removing the Risk source (e.g. closing an e-commerce portal); Taking additional risk or increasing risk so as to pursue a business opportunity (e.g. opening an e-commerce portal); Modifying the R...

ISO 27001 CLAUSE 6.2 Information security objectives & planning | Infosavvy

Image
Information security objectives and planning to achieve them Required activity The organization establishes  information security  objectives and plans to realize them at relevant functions and levels. Implementation Guideline Information security objectives help to implement strategic goals of a corporation also on implement the knowledge security policy. Thereby, objectives in an ISMS are the knowledge security objectives for confidentiality, integrity and availability of data. Information security objectives also help to specify and measure the performance of data  security controls  and processes, in accordance with the knowledge security policy. The organization plans establishes and issues information security objectives to relevant functions and levels. Requirements in ISO/IEC 27001 concerning information security objectives apply to all or any information security objectives. If the knowledge security policy contains objectives, then those ...