Iso 27001 Business Continuity Checklist: Your Logo
Iso 27001 Business Continuity Checklist: Your Logo
Iso 27001 Business Continuity Checklist: Your Logo
CONTINUITY CHECKLIST
Date: 00/00/0000
YOUR
LOGO
1 5
INFORMATION SECURITY OPERATIONS SECURITY
POLICIES /ORGANIZATION
Descriptive Text
OF INFORMATION SECURITY
Descriptive Text
6
COMMUNICATION SECURITY /
2
HUMAN RESOURCES SECURITY /
ASSET MANAGEMENT SYSTEM ACQUISITION,
DEVELOPMENT, AND MAINTENANCE
Descriptive Text
Descriptive Text
3 7
ACCESS CONTROL SUPPLIER RELATIONSHIPS /
Descriptive Text INFORMATION SECURITY INCIDENT MANAGEMENT /
INFORMATION SECURITY ASPECTS OF BUSINESS
CONTINUITY MANAGEMENT /
COMPLIANCE
CRYPTOGRAPHY / PHYSICAL Descriptive Text
ACCESS CONTROL
REQUIREMENT
SECTION/ ASSESSMENT IN COMPLIANCE? REMARKS
CATEGORY
10. Cryptography
10.1 Defined policy for use of cryptographic controls?
10.2 Defined policy for key management?
11. Physical and environmental security
11.1 Defined policy for physical security perimeter?
11.2 Defined policy for physical entry controls?
11.3 Defined policy for securing offices, rooms, and facilities?
Defined policy for protection against external and environmental
11.4
threats?
11.5 Defined policy for working in secure areas?
11.6 Defined policy for delivery and loading areas?
11.7 Defined policy for equipment siting and protection?
11.8 Defined policy for supporting utilities?
11.9 Defined policy for cabling security?
11.10 Defined policy for equipment maintenance?
11.11 Defined policy for removal of assets?
Defined policy for security of equipment and assets
11.12
off premises?
11.13 Secure disposal or re-use of equipment?
11.14 Defined policy for unattended user equipment?
11.15 Defined policy for clear desk and clear screen policy?
OPERATIONS SECURITY
REQUIREMENT
SECTION/ ASSESSMENT IN COMPLIANCE? REMARKS
CATEGORY
13. Communication security
13.1 Defined policy for network controls?
18. Compliance
Defined policy for identification of applicable legislation and
18.1
contractual requirement?
18.6 Defined policy for compliance with security policies and standards?