~ |
Use within
organizations to formulate security requirements and objectives; |
~ |
Use within
organizations as a way to ensure that security risks are cost
effectively managed; |
~ |
Use within
organizations to ensure compliance with laws and regulations; |
~ |
Use
within an organization as a process framework for the implementation
and management of controls to ensure that the specific security
objectives of an organization are met; |
~ |
Definition
of new information security management processes; |
~ |
Identification
and clarification of existing information security management processes; |
~ |
Use by the
management of organizations to determine the status of information
security management activities;
|
~ |
Use
by the internal and external auditors of organizations to determine the
degree of compliance with the policies, directives and standards
adopted by an organization; |
~ |
Use
by organizations to provide relevant information about information
security policies, directives, standards and procedures to customers,
trading partners and other organizations with whom they interact for
operational or commercial reasons; |
~ |
Implementation
of business-enabling information security; |