Properties (59)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:International_Standard
|
gptkbp:aimsTo |
confidentiality
availability integrity |
gptkbp:associated_with |
business objectives
|
gptkbp:basedOn |
Plan-Do-Check-Act (PDCA) model
|
gptkbp:evaluates |
security posture
|
gptkbp:facilitates |
data protection regulations
|
gptkbp:has_a_focus_on |
information security management
|
gptkbp:includes |
internal audits
security controls control objectives |
gptkbp:initiatives |
managing sensitive data
|
gptkbp:is_a |
Information security management system
|
gptkbp:is_a_platform_for |
data governance
data protection managing sensitive information |
gptkbp:is_a_resource_for |
information security best practices
|
gptkbp:is_a_route_for |
incident management
supply chain security data breach response plans some contracts ISO_27002_compliance |
gptkbp:is_a_tool_for |
stakeholder confidence
|
gptkbp:is_designed_to |
organizational resilience
|
gptkbp:is_essential_for |
regulatory compliance
risk management business continuity planning |
gptkbp:is_integrated_with |
other management systems
|
gptkbp:is_monitored_by |
third-party auditors
|
gptkbp:is_part_of |
gptkb:ISO/IEC_27000_family
risk management strategy |
gptkbp:is_recognized_for |
true
government agencies ISO certification bodies a best practice standard. |
gptkbp:is_used_in |
gptkb:ISO_9001
due diligence security policies various industries security frameworks IT security audits certification_of_ISMS |
gptkbp:isUpdatedBy |
true
|
gptkbp:provides |
establishing an ISMS
|
gptkbp:publishedBy |
gptkb:International_Organization_for_Standardization
2013 |
gptkbp:related_to |
cloud security
|
gptkbp:replacedBy |
ISO/IEC 27001:2005
|
gptkbp:requires |
true
risk assessment continuous improvement information security policies |
gptkbp:suitableFor |
non-profit organizations
large enterprises small businesses any organization |
gptkbp:traditions |
information security governance
information risk management |