ISO 27001 Controls: A Guide to Implementing and Auditing, Second Edition

  • 2h 57m
  • Bridget Kenyon
  • IT Governance
  • 2024

Following the success of the first edition, this book has been re-released to reflect the ISO/IEC 27001:2022 and ISO/IEC 27002:2022 updates.

Ideal for information security managers, auditors, consultants, and organizations preparing for ISO 27001:2022 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001:2022. Similarly, for anyone involved in internal or external audits, the book includes the definitive requirements that auditors must address when certifying organizations to ISO 27001:2022.

The auditing guidance covers what evidence an auditor should look for to satisfy themselves that the requirement has been met. This guidance is useful for internal auditors and consultants, as well as information security managers and lead implementers as a means of confirming that their implementation and evidence to support it will be sufficient to pass an audit.

This guide is intended to be used by those involved in:

  • Designing, implementing, and/or maintaining an ISMS
  • Preparing for ISMS audits and assessments
  • Undertaking both internal and third-party ISMS audits and assessments

About the Author

Bridget Kenyon is the Chief Information Security Officer for SSCL. She is responsible for managing strategy and information security activities for the whole organization, including internal and customer-facing elements. In parallel to her main role, Bridget has been on the ISO editing team for ISMS standards since 2006; she has served as Lead Editor for ISO/IEC 27001:2022 and ISO/IEC 27014:2020.

Joining DERA in 2000 to work on network vulnerabilities, Bridget discovered her passion for information security and cybersecurity. Following this, she has been a Qualified Security Assessor against PCI DSS and Head of Information Security for UCL, and has held operational and consultancy roles in both industry and academia. She is a member of the UK Advisory Council for ISC2, and a Fellow of the Chartered Institute of Information Security.

Bridget’s interests lie in finding the edges of security that you can peel up, and the human aspects of system vulnerability. She’s the sort of person who will always have a foot in both the technical and strategy camps. She enjoys helping people find solutions to thorny problems, and strongly believes that cybersecurity and information security are fundamental to resilient business operations, not “nice to haves”.

In this Book

  • Foreword
  • Scope of This Guide
  • Field of Application
  • Meeting ISO/IEC 27001 Requirements
  • Using Control Attributes
  • Organizational Controls (ISO/IEC 27001, A.5)
  • People Controls (ISO/IEC 27001, A.6)
  • Physical Controls
  • Technological Controls
  • Further Reading

YOU MIGHT ALSO LIKE

Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.5 of 84 users Rating 4.5 of 84 users (84)