Demo writer (talk | contribs) m (1 revision imported) |
m (1 revision imported) |
(One intermediate revision by one other user not shown) | |
(No difference)
|
Latest revision as of 13:37, 10 June 2024
This is a property of type Text.
The allowed values for this property are:
- 1 Scope
- 2 Normative references
- 3 Terms and definitions
- 4 Context of the organization
- 4.1 Understanding the organization and its context
- 4.2 Understanding the needs and expectations of interested parties
- 4.3 Determining the scope of the information security management system
- 4.4 Information security management system
- 5 Leadership
- 5.1 Leadership and commitment
- 5.2 Policy
- 5.3 Organizational roles, responsibilities and authorities
- 6 Planning
- 6.1 Actions to address risks and opportunities
- 6.2 Information security objectives and planning to achieve them
- 7 Support
- 7.1 Resources
- 7.2 Competence
- 7.3 Awareness
- 7.4 Communication
- 7.5 Documented information
- 8 Operation
- 8.1 Operational planning and control
- 8.2 Information security risk assessment
- 8.3 Information security risk treatment
- 9 Performance evaluation
- 9.1 Monitoring, measurement, analysis and evaluation
- 9.2 Internal audit
- 9.3 Management review
- 10 Improvement
- 10.1 Nonconformity and corrective action
- 10.2 Continual improvement
{ "type": "PROPERTY_CONSTRAINT_SCHEMA", "constraints": { "type_constraint": "_txt", "allowed_values": [ "1 Scope", "2 Normative references", "3 Terms and definitions", "4 Context of the organization", "4.1 Understanding the organization and its context", "4.2 Understanding the needs and expectations of interested parties", "4.3 Determining the scope of the information security management system", "4.4 Information security management system", "5 Leadership", "5.1 Leadership and commitment", "5.2 Policy", "5.3 Organizational roles, responsibilities and authorities", "6 Planning", "6.1 Actions to address risks and opportunities", "6.2 Information security objectives and planning to achieve them", "7 Support", "7.1 Resources", "7.2 Competence", "7.3 Awareness", "7.4 Communication", "7.5 Documented information", "8 Operation", "8.1 Operational planning and control", "8.2 Information security risk assessment", "8.3 Information security risk treatment", "9 Performance evaluation", "9.1 Monitoring, measurement, analysis and evaluation", "9.2 Internal audit", "9.3 Management review", "10 Improvement", "10.1 Nonconformity and corrective action", "10.2 Continual improvement" ] } }