ISO 27001 Requirements Checklist: Steps and Tips for Implementation
Reciprocity
OCTOBER 1, 2022
8 – Asset Management. 13 – Communications Security. Asset Management, Annex A.8 This section addresses how organizations define acceptable information protection obligations and identify information assets. Technical vulnerability management is covered in Annex A.12.6, 8 (10 controls).
Let's personalize your content