article thumbnail

ISO 27001 Certification Requirements & Standards

Reciprocity

Perform a Gap Analysis. A gap analysis gives you a high-level summary of what needs to be done to attain certification and allows you to examine and compare your organization’s current information security arrangements to the ISO 27001 standards. Evaluating risks. Identifying possible threats.

Audit 52
article thumbnail

Audit Checklist for SOC 2

Reciprocity

.” The most prevalent types of service organizations to which the SOC applies include, but are not limited to: Software as a service (SaaS) businesses that offer software, applications, and websites. Therefore, select the trust services criteria that are appropriate and applicable to your services. Perform a SOC 2 Gap Analysis.

Audit 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RTO vs. RPO: What’s the Difference and How are They Used?

Castellan

When discussing business continuity, your resources may cover a range of categories, including applications, vendors, facilities, people, and equipment. Email application: 4 hours Finance systems and services: 1-2 days Customer Relationship Management System (CRM): 1 day. What Are Some RTO Examples? However, here are some RTO examples.

article thumbnail

5 Steps towards an Actionable Risk Appetite

LogisManager

Conducting a gap analysis with a risk tolerance level will help you identify emerging risks before they rise out of tolerance and it becomes clear that certain mitigation activities are no longer sufficient. After risk assessments are completed, process owners must evaluate results.

article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

Be aware, however, that certification is evaluated and granted by an independent third party that conducts the certification audit. Once the ISO 27001 audit is complete, the auditor gives the organization a Statement of Applicability (SOA) summarizing its position on all security controls. How Do You Perform a Gap Analysis?