ISO 27001 Annex : 12 Operations Security

 


ISO 27001 Annex : 12 Operations Security in this article explain Operational procedures and responsibilities, Documented Operating Procedures, Change Management & Separation of Development, Testing and Operational Environments.

A.12.1  Operational procedures and responsibilities

Its objective is to ensure that information processing facilities operate correctly and securely.

A.12.1.1  Documented Operating Procedures

Control-Operating procedures should be documented and accessed by all users in need.

Implementation Guidance- Documented procedures for operating information processing and communications facility activities should be prepared including computer start-up and closing down, backup, maintenance of equipment, media handling, computer room and mail management, and safety.

The operating procedures should include the following operating instructions:

  1. Systems installation and settings;
  2. Automated and manual processing and management of information;
  3. Backing up
  4. scheduling requirements such as early work start and latest job completion times, including interdependencies to other systems;
  5. Instructions for handling errors or any additional exceptional conditions, including restrictions on system utilities that may arise during job execution;
  6. Support and escalation contacts in cases of unexpected operational or technical issues include external support contacts
  7. Specific output and medium handling instructions, including procedures for safe disposition of the output from failed work, such as the use of specific stationery or confidential output management;
  8. system reboot and recovery procedures for the system failure to be used;
  9. Audit-trail management and system log information;
  10. Procedures for monitoring.

Related Product : ISO 27001 Lead Auditor Training And Certification ISMS

Operating procedures and documented procedures for system operations should be treated as managerial authorized formal documents and alterations. Where technically feasible, IT systems should be consistently administered using the same procedures, tools, and utilities.

Read More : https://info-savvy.com/iso-27001-annex-12-operations-security/

-----------------------------------------------------------------------------------------------------------------------------

This Blog Article is posted by
Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com

Comments

Post a Comment

Popular posts from this blog

10 Secrets You Will Never Know About Cyber Security And Its Important

What is Penetration testing ?

Types of Vulnerability Assessment