m (1 revision imported)
m (1 revision imported)
 
(3 intermediate revisions by 2 users not shown)
(No difference)

Latest revision as of 13:37, 10 June 2024

This is a property of type Text.

The allowed values for this property are:

  • 1 Scope
  • 2 Normative references
  • 3 Terms and definitions
  • 4 Context of the organization
  • 4.1 Understanding the organization and its context
  • 4.2 Understanding the needs and expectations of interested parties
  • 4.3 Determining the scope of the information security management system
  • 4.4 Information security management system
  • 5 Leadership
  • 5.1 Leadership and commitment
  • 5.2 Policy
  • 5.3 Organizational roles, responsibilities and authorities
  • 6 Planning
  • 6.1 Actions to address risks and opportunities
  • 6.2 Information security objectives and planning to achieve them
  • 7 Support
  • 7.1 Resources
  • 7.2 Competence
  • 7.3 Awareness
  • 7.4 Communication
  • 7.5 Documented information
  • 8 Operation
  • 8.1 Operational planning and control
  • 8.2 Information security risk assessment
  • 8.3 Information security risk treatment
  • 9 Performance evaluation
  • 9.1 Monitoring, measurement, analysis and evaluation
  • 9.2 Internal audit
  • 9.3 Management review
  • 10 Improvement
  • 10.1 Nonconformity and corrective action
  • 10.2 Continual improvement
The request is being processed and may take a moment. Preparing...
{ "type": "PROPERTY_CONSTRAINT_SCHEMA", "constraints": { "type_constraint": "_txt", "allowed_values": [ "1 Scope", "2 Normative references", "3 Terms and definitions", "4 Context of the organization", "4.1 Understanding the organization and its context", "4.2 Understanding the needs and expectations of interested parties", "4.3 Determining the scope of the information security management system", "4.4 Information security management system", "5 Leadership", "5.1 Leadership and commitment", "5.2 Policy", "5.3 Organizational roles, responsibilities and authorities", "6 Planning", "6.1 Actions to address risks and opportunities", "6.2 Information security objectives and planning to achieve them", "7 Support", "7.1 Resources", "7.2 Competence", "7.3 Awareness", "7.4 Communication", "7.5 Documented information", "8 Operation", "8.1 Operational planning and control", "8.2 Information security risk assessment", "8.3 Information security risk treatment", "9 Performance evaluation", "9.1 Monitoring, measurement, analysis and evaluation", "9.2 Internal audit", "9.3 Management review", "10 Improvement", "10.1 Nonconformity and corrective action", "10.2 Continual improvement" ] } }