ICS Registrars, Quality Assured, UKAS Quality Management 229

Company Certificate Training Contact Us

ISO 9001

ISO 14001

ISO 45001


ISO 27001

ISO 22000


ISO 27001 - The standard for Information Security Management

ISO 27001 has been established  with the aim of providing security for the maintenance of information, in an organization.
This standard is an Information Security Management System (ISMS) standard and part of the ISO/IEC 27000 family of the standards that was published by the International Organization for Standardization and International Electro technical Commission.
ISO / IEC 27001 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. ISO/IEC 27001 is designed to ensure the selection of adequate and proportionate security controls that protects information  and enhances confidence to interested parties.
ISO 27001 (The standard for Information Security Management)

Information Security can be characterized as the preservation of :

Confidentiality Ensuring that access to information is appropriately authorized.
Integrity Safeguarding the accuracy and completeness of information and integrity processing methods.
Ensuring that authorized users have access to information , when needed.

ISO/IEC 27001 is suitable for various  purposes, including the following :

~ Use within organizations to formulate security requirements and objectives;
~ Use within organizations as a way to ensure that security risks are cost effectively managed;
~ Use within organizations to ensure compliance with laws and regulations;
~ Use within an organization as a process framework for the implementation and management of controls to ensure that the specific security objectives of an organization are met;
~ Definition of new information security management processes;
~ Identification and clarification of existing information security management processes;
~ Use by the management of organizations to determine the status of information security management activities;
~ Use by the internal and external auditors of organizations to determine the degree of compliance with the policies, directives and standards adopted by an organization;
~ Use by organizations to provide relevant information about information security policies, directives, standards and procedures to customers, trading partners and other organizations with whom they interact for operational or commercial reasons;
~ Implementation of business-enabling information security;
Back to Top
Copyright © 2016, ICS Certification (M) Sdn Bhd All rights reserved.
Designed and SEO by PicoCentury Software Development Sdn Bhd