Remove Asset Management Remove Gap Analysis Remove Malware Remove Vulnerability
article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

8 – Asset Management. Asset Management, Annex A.8 This section addresses how organizations define acceptable information protection obligations and identify information assets. Malware is addressed in Annex A.12.2, Technical vulnerability management is covered in Annex A.12.6,