ISO 27001 Compliance Checklist Cybeready

You might also like

Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 8

CybeReady’s mission is to make security awareness training easy and effective f

bringing together learning expertise, data science and automation, we allow enter
success.
"Like a sailing crew in the middle of an unexpected storm, employees need to be
scenario. When it comes to cyberattacks, only a continuous, frequent training reg
employees readiness".

Mike Polatsek, CybeReady Co-founder and CSO

Security awareness training has never been easy.


Until now.

https://cybeready.com/
s training easy and effective for enterprises. By
nd automation, we allow enterprises to embrace

storm, employees need to be ready for any


ntinuous, frequent training regimen can build
0/3

0/3

0/1

0/6

0/5
0/5

0/4

0/6
0/2

0/2
Understand the Standard
Familiarize yourself and your team with the ISO 27001 Standard

Assess internal and external issues relevant to ISMS

Assess how those issues affect the ability of the ISMS to achieve its intended outcome

Conduct a Gap Analysis


Determine the boundaries of the ISMS

Take inventory of the ISMS already deployed

Verify the scope of the ISMS matches the expected boundaries

Define the Scope


Define and document your ISMS for audit purposes

Establish a Management Framework


Demonstrate leadership and commitment

Integrate the ISMS into the business process

Establish information security policy and objectives

Identify management of the ISMS

Promote continued development

Establish processes for continuous monitoring and adjustment of your ISMS

Perform Risk Assessments


Assess and document information security risks

Establish acceptable risk criteria

Establish a risk remediation plan

Communicate and assign risk ownership

Integrate your risk assessment plans into your ISMS processes

Implement Controls
Extensively document your implementation process

Monitor the ISMS deployment to ensure it is following your plan

Evaluate and adjust the deployment process based on any unforeseen circumstances

Monitor and control any outsourced processes

Adhere to your risk management plan

Train Employees

Hire trained persons or train and educate new persons for ISMS work

Create a culture of security awareness using continuous training

Ensure all personnel have adequate communication channels

Protect, distribute, and store all documentation regarding the ISMS

Monitor and Review

Perform internal audits in planned intervals

Document the results of your internal audits

Evaluate the ISMS by your organization's demands

Stakeholders should review all audits


Elicit feedback from interested parties

Periodically evaluate risk assessment and mitigation plan

Internal Audit

Clearly define the points of failure and methods of improvement

Document the results of the improvement processes

Certification Audit

Collect all relevant documentation

Prepare and undergo a certification audit by an accredited certification body

You might also like