hw>WikiSysop m 1 revision imported |
No edit summary Tag: 2017 source edit |
||
(4 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
This is a property of type [[Has type::Text]]. | This is a property of type [[Has type::Text]]. | ||
<div class="mw-customtoggle-QMinfo" style="background:#f1f3f9; padding:4px"><span class="bi bi-arrow-right-circle"></span>Allowed values</div> | |||
<div class="mw-collapsible mw-collapsed" id="mw-customcollapsible-QMinfo"> | |||
<div class="mw-collapsible-content"> | |||
The allowed values for this property are: | The allowed values for this property are: | ||
Line 33: | Line 35: | ||
*[[Allows value::9.3 Management review]] | *[[Allows value::9.3 Management review]] | ||
*[[Allows value::10 Improvement]] | *[[Allows value::10 Improvement]] | ||
*[[Allows value::10.1 | *[[Allows value::10.1 Continual improvement]] | ||
*[[Allows value::10.2 | *[[Allows value::10.2 Nonconformity and corrective action]] | ||
</div></div> |
Latest revision as of 13:31, 12 May 2025
This is a property of type Text.
Allowed values
The allowed values for this property are:
- 1 Scope
- 2 Normative references
- 3 Terms and definitions
- 4 Context of the organization
- 4.1 Understanding the organization and its context
- 4.2 Understanding the needs and expectations of interested parties
- 4.3 Determining the scope of the information security management system
- 4.4 Information security management system
- 5 Leadership
- 5.1 Leadership and commitment
- 5.2 Policy
- 5.3 Organizational roles, responsibilities and authorities
- 6 Planning
- 6.1 Actions to address risks and opportunities
- 6.2 Information security objectives and planning to achieve them
- 7 Support
- 7.1 Resources
- 7.2 Competence
- 7.3 Awareness
- 7.4 Communication
- 7.5 Documented information
- 8 Operation
- 8.1 Operational planning and control
- 8.2 Information security risk assessment
- 8.3 Information security risk treatment
- 9 Performance evaluation
- 9.1 Monitoring, measurement, analysis and evaluation
- 9.2 Internal audit
- 9.3 Management review
- 10 Improvement
- 10.1 Continual improvement
- 10.2 Nonconformity and corrective action
{ "type": "PROPERTY_CONSTRAINT_SCHEMA", "constraints": { "type_constraint": "_txt", "allowed_values": [ "1 Scope", "2 Normative references", "3 Terms and definitions", "4 Context of the organization", "4.1 Understanding the organization and its context", "4.2 Understanding the needs and expectations of interested parties", "4.3 Determining the scope of the information security management system", "4.4 Information security management system", "5 Leadership", "5.1 Leadership and commitment", "5.2 Policy", "5.3 Organizational roles, responsibilities and authorities", "6 Planning", "6.1 Actions to address risks and opportunities", "6.2 Information security objectives and planning to achieve them", "7 Support", "7.1 Resources", "7.2 Competence", "7.3 Awareness", "7.4 Communication", "7.5 Documented information", "8 Operation", "8.1 Operational planning and control", "8.2 Information security risk assessment", "8.3 Information security risk treatment", "9 Performance evaluation", "9.1 Monitoring, measurement, analysis and evaluation", "9.2 Internal audit", "9.3 Management review", "10 Improvement", "10.1 Continual improvement", "10.2 Nonconformity and corrective action" ] } }