• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • Resources
    • Calculators
      • ISO Certification Cost Calculator
      • Cost of Quality Calculator
    • Lowest Cost ISO Services Quote Program
    • Online Gap Checklists
      • ISO 9001 Gap Checklist
        • ISO 9001 Gap Checklist Overview
        • ISO 9001 Gap Checklist Sample
        • ISO 9001 Gap Checklist Dashboard
      • ISO 45001 Gap Checklist
        • 45001 Checklist Gap Checklist Overview
        • ISO 45001 Gap Checklist Sample
        • ISO 45001 Gap Checklist Dashboard
      • ISO 27001 Gap Checklist
        • ISO/IEC 27001 Gap Checklist Overview
        • ISO 27001 Gap Checklist Sample
        • ISO 27001 Gap Checklist Dashboard
    • White Papers
      • AI and Quality Management: Many Questions, Few Answers
      • A Guide to Quality Risk Management
      • ISO 9001 Updates FAQ
      • Integrating ISO 27001 and ISO 9001
    • Job Salary Reports
      • Quality Professionals Salary Report
    • Free Quality Ebook
    • Glossary
  • Articles
    • Environment
    • Cybersecurity
      • Artificial Intelligence
      • Automation
      • Career
      • Certification Management
      • Continuous Improvement
      • Documentation
      • ISO 27001
      • Information Security Mgt. Systems (ISMS)
      • Management
      • Regulatory
      • Risk Management
      • Software
      • Supplier Quality
      • Sustainability
    • Management Systems
    • Manufacturing
    • Quality
      • Artificial Intelligence
      • Automation
      • Career
      • Certification Management
      • Continuous Improvement
      • Cost of Quality
      • Documentation
      • ISO 9001
      • LEAN-6 Sigma
      • Product Safety
      • Quality Management
      • Regulatory
      • Risk Management
      • Root Cause
      • Skills
      • Software
      • Supplier Quality
      • Sustainability
    • Safety
      • Product Safety Certification
      • Risk Management
  • What We Do
    • About Conformance 1
    • Group Purchasing
    • Negotiated Discounts
    • Why Buy Through Us?
  • Products/Services
    • Name Your Fee Training
    • Registrar Directory
    • Software Directory
    • Consultant Directory
  • Online Gap Checklists
    • ISO 9001 Dashboard
    • ISO 45001 Dashboard
    • ISO 27001 Dashboard
  • Contact
    • General Inquiries
    • Ask an ISO Expert
  • Login
    • Login
    • Log Out
Conformance1

Conformance1

Tools for conforming to standards, goals and processes

8.14 Redundancy of information processing facilities

To ensure that services and information systems are available, the organization can create redundant systems architecture by replicating information processing and implementing procedures for activating redundant components. Redundant components should provide similar security access as primary ones and make them available during repairs or replacement. Consider contracting … [Read more...] about 8.14 Redundancy of information processing facilities

8.13 Information backup

This section discusses the need for organizations to establish a issue-specific backup policy for data security and retention. The policy should consider business requirements, security requirements, and criticality of information when developing plans for backing up information, software, and systems. The backup plan should include procedures for producing accurate records and … [Read more...] about 8.13 Information backup

8.12 Data leakage prevention

This question involves measures that organizations can take to prevent data leakage. This includes recognizing and categorizing sensitive information, reviewing where data leakage occurs, and preventing leaks. Data leakage prevention are meant to recognize and surveill sensitive information, detect any disclosed information, and stop actions that reveals sensitive data. … [Read more...] about 8.12 Data leakage prevention

8.11 Data masking

To protect sensitive data such as personally identifiable information (PII), organizations should consider data masking, pseudonymization, or anonymization. These tools conceal sensitive data and ensure privacy by disconnecting PII and the user's identity. However, when using these techniques, it is important to have data pseudonymized or anonymized to prevent indirect … [Read more...] about 8.11 Data masking

8.10 Information deletion

Organizations should not keep sensitive information longer than necessary. This guideline will lessen the risk of unlawful access. If deleting information, the organization should consider the appropriate deletion method, record the aftermath of deletion, and obtain evidence of deletion from service providers. Organizations should also include information deletion requirements … [Read more...] about 8.10 Information deletion

8.9 Configuration management

To ensure the security of hardware, software, services, and networks, an organization should create and enact procedures or tools for defined configurations and make sure that they remain satisfactory over their lifetime. The organization should establish standard templates for secure configuration, using publicly available guidance and considering the organization's security … [Read more...] about 8.9 Configuration management

8.8 Management of technical vulnerabilities

To effectively manage technical vulnerabilities, an organization keep a relevant inventory of its assets, including software vendor, names, version numbers, and deployment state. Organizations should also define roles and responsibilities for vulnerability management, identify relevant information resources, require vulnerability reporting from suppliers, and use suitable … [Read more...] about 8.8 Management of technical vulnerabilities

8.7 Protection against malware

To protect against malware, a multi-layered approach is necessary, including implementing controls to prevent the use of unauthorized software and known malicious websites, reducing vulnerabilities, regular scanning of systems and data for malware, implementing appropriate malware detection and repair tools based on risk assessment, isolating critical environments, and training … [Read more...] about 8.7 Protection against malware

8.6 Capacity management

Identify capacity needs for facilities and resources, consider criticality. Tune and monitor systems for accessibility and efficiency, stress-test for sufficient capacity. Future capacity needs and trends should be considered. Managers use capacity info to avoid limitations and plan. To raise capacity, consider new resources and cloud computing. Reduce demand by deleting … [Read more...] about 8.6 Capacity management

8.5 Secure authentication

This section covers guidelines for authentication and log-on procedures to minimize the risk of unauthorized access to systems or applications. Strong authentication alternatives to password include digital certificates, smart cards, tokens, or biometric means. They should be used for the organization's more critical information systems. Multi-factor authentication should … [Read more...] about 8.5 Secure authentication

8.4 Access to source code

This section discusses guidelines for controlling entries to see source code, associated items, and tools to prevent corruption and ensure data security. Access to these items should be tightly managed, and source code writing or access should be granted based on the organization's needs. Source code storage is recommended, and access to externally located code archives should … [Read more...] about 8.4 Access to source code

8.3 Information access restriction

This section describes the importance of restricting access to sensitive data and other assets. It suggests several measures for controlling access, such as configuration, controlling user access to specific data, and allowing access controls. Additionally, it recommends implementing access management procedures to protect sensitive data with high organizational value. These … [Read more...] about 8.3 Information access restriction

8.2 Privileged access rights

Access rights should require an authorization process. The process includes naming users with favored access capabilities, providing certain access rights if needed, using authorization procedures, defining requirements for closing privileged access capabilities, and regularly reviewing those with privileged access rights. Additionally, the policy should establish specific … [Read more...] about 8.2 Privileged access rights

8.1 User end point devices

Organizations should enact a policy for the secure configuration and use of endpoint devices, taking into account factors such as information type and classification level, physical protection, software restrictions, access controls, storage device encryption, protection against malware, backups, and usage of devices. The policy should be communicated to relevant personnel and … [Read more...] about 8.1 User end point devices

7.14 Secure disposal or re-use of equipment

Before disposing or re-using, equipment should undergo verification to determine if it contains storage media. If the storage media contains confidential information or materials with copyright, it should be disposed of or the data should be securely deleted, overwritten, or destroyed to prevent retrieval. Guidelines for safely destroying storage media are found in section … [Read more...] about 7.14 Secure disposal or re-use of equipment

7.13 Equipment maintenance

Maintaining equipment involves several guidelines: Follow suppliers' recommendations, enact a maintenance program, use authorized personnel for repairs, collect maintenance records, limit entries by remote maintenance, secure off-premises assets, comply with insurance maintenance requirements, inspect the equipment after maintenance, and either dispose of or keep using the … [Read more...] about 7.13 Equipment maintenance

7.12 Cabling security

For cable security, organizations should protect electric and telecommunications cables in information processors by separating the lines, particularly for important or vulnerable systems. These controls may include installing armored conduits, using electromagnetic shielding, and controlling access to patch panels or cable areas. Cables should also be labeled with details for … [Read more...] about 7.12 Cabling security

7.11 Supporting utilities

To support their information processors, organizations rely on utilities such as electricity, water, gas, and more. To ensure their proper functioning and minimize risks, the organization considers maintaining and inspecting the utility equipment often, appraising their capacity regularly, and detecting any malfunctions as needed. Emergency lighting, communications, and cutoff … [Read more...] about 7.11 Supporting utilities

7.10 Storage media

The directives for managing detachable storage media include establishing a policy for their use, keeping records of their removal, storing them in a secure environment, adopting cryptographic tools to safeguard the data, transferring data to new storage media, and securely disposing of them. When transporting something used as physical storage, organizations should use … [Read more...] about 7.10 Storage media

7.9 Security of assets off-premises

Management should authorize devices used outside an organization's premises, such as mobile devices or personally-owned devices used for work, and require protection for them. Guidelines for protecting such devices include not leaving them publicly unattended, following manufacturers' instructions for protection, logging device custody when transferring equipment, using … [Read more...] about 7.9 Security of assets off-premises

« Previous Page
Next Page »

Primary Sidebar

Search

Email Newsletter

News delivered to your inbox

Name(Required)
Newsletter Preferences(Required)
This field is hidden when viewing the form
This field is for validation purposes and should be left unchanged.

Related Items

Help us improve our tool

Have a suggestion for improving our ISO Gap Analysis Checklist? Let us know.

Footer

Important Resources

Cost of Quality Calculator

ISO 9001 Online Gap Analysis

ISO Certification Cost Calculator

Free Quality Ebook

Process Improvement Survey

ISO 9001 Glossary

 

Recent Posts

  • Important Role of Thermal Imaging for Condition Monitoring
  • The Top 10 Security Awareness Training Solutions For Business
  • Improving Data Cleaning by Learning From Unstructured Textual Data
  • Operational Key Performance Indicators (KPIs) 2.0: A Smarter Way to Visualize and Use Your Metrics
  • Mastering the 8D Problem-Solving Methodology: A Guide to Root Cause Analysis in Manufacturing

Search

Contact Us

About Us

Privacy Policy

 

Copyright © 2025 · Conformance1 · Log in