Documente Academic
Documente Profesional
Documente Cultură
Compliance
Prevention of misuse of information processing
15.1.5
facilities
Compliance 15.1.6 Regulation of cryptographic controls
Compliance with Security Policies and Standards
15.2
and Technical compliance
15.2.1 Compliance with security policy
15.2.2 Technical compliance checking
15.3 Information System Audit Considerations
15.3.1 Information System Audit controls
15.3.2 Protection of information system audit tools
Prepared by:
Richard O. Regalado
Information Security Consultant
"This work is copyright © 2007, ISO27k implementers' forum, some rights reserved. It is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 3.0 License. You are welcome to
reproduce, circulate, use and create derivative works from this provided that (a) it is not sold or incorporated into a commercial product, (b) it is properly attributed to the ISO27k implementers' forum
www.ISO27001security.com), and (c) derivative works are shared under the same terms as this.).
Current as of:
2007 September 20
Policy created
Formalized PM mechanism
Implemented procedure
mercial-Share Alike 3.0 License. You are welcome to
rly attributed to the ISO27k implementers' forum