Buch, Englisch, 152 Seiten, Format (B × H): 159 mm x 241 mm, Gewicht: 378 g
Iso/Iec 27001, Nist Sp 800-53, Hipaa Standard, PCI Dss V2.0, and Aup V5.0
Buch, Englisch, 152 Seiten, Format (B × H): 159 mm x 241 mm, Gewicht: 378 g
ISBN: 978-1-4665-8058-9
Verlag: CRC Press
Explaining how to write policy statements that address multiple compliance standards and regulatory requirements, the book will help readers elicit management opinions on information security and document the formal and informal procedures currently in place. Topics covered include:
- Entity-level policies and procedures
- Access-control policies and procedures
- Change control and change management
- System information integrity and monitoring
- System services acquisition and protection
- Informational asset management
- Continuity of operations
The book supplies you with the tools to use the full range of compliance standards as guides for writing policies that meet the security needs of your organization. Detailing a methodology to facilitate the elicitation process, it asks pointed questions to help you obtain the information needed to write relevant policies. More importantly, this methodology can help you identify the weaknesses and vulnerabilities that exist in your organization.
A valuable resource for policy writers who must meet multiple compliance standards, this guidebook is also available in eBook format. The eBook version includes hyperlinks beside each statement that explain what the various standards say about each topic and provide time-saving guidance in determining what your policy should include.
Zielgruppe
Academic and Postgraduate
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Wirtschaftsinformatik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Wirtschaftswissenschaften Betriebswirtschaft Management Compliance
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
Weitere Infos & Material
Introduction. Entity Level Policies and Procedures. Access Control Policies and Procedures. Change Control and Change Management. System Information Integrity and Monitoring. System Services Acquisition and Protection. Informational Asset Management. Continuity of Operations.