hw>Mlink-rodrigue (Created page with "This is a property of type Has type::Text. The allowed values for this property are: *Allows value::1 Scope *Allows value::2 Normative references *Allows...") |
Demo writer (talk | contribs) m (1 revision imported) |
(No difference)
|
Revision as of 15:48, 1 December 2021
This is a property of type Text.
The allowed values for this property are:
- 1 Scope
- 2 Normative references
- 3 Terms and definitions
- 4 Context of the organization
- 4.1 Understanding the organization and its context
- 4.2 Understanding the needs and expectations of interested parties
- 4.3 Determining the scope of the information security management system
- 4.4 Information security management system
- 5 Leadership
- 5.1 Leadership and commitment
- 5.2 Policy
- 5.3 Organizational roles, responsibilities and authorities
- 6 Planning
- 6.1 Actions to address risks and opportunities
- 6.2 Information security objectives and planning to achieve them
- 7 Support
- 7.1 Resources
- 7.2 Competence
- 7.3 Awareness
- 7.4 Communication
- 7.5 Documented information
- 8 Operation
- 8.1 Operational planning and control
- 8.2 Information security risk assessment
- 8.3 Information security risk treatment
- 9 Performance evaluation
- 9.1 Monitoring, measurement, analysis and evaluation
- 9.2 Internal audit
- 9.3 Management review
- 10 Improvement
- 10.1 Nonconformity and corrective action
- 10.2 Continual improvement
{ "type": "PROPERTY_CONSTRAINT_SCHEMA", "constraints": { "type_constraint": "_txt", "allowed_values": [ "1 Scope", "2 Normative references", "3 Terms and definitions", "4 Context of the organization", "4.1 Understanding the organization and its context", "4.2 Understanding the needs and expectations of interested parties", "4.3 Determining the scope of the information security management system", "4.4 Information security management system", "5 Leadership", "5.1 Leadership and commitment", "5.2 Policy", "5.3 Organizational roles, responsibilities and authorities", "6 Planning", "6.1 Actions to address risks and opportunities", "6.2 Information security objectives and planning to achieve them", "7 Support", "7.1 Resources", "7.2 Competence", "7.3 Awareness", "7.4 Communication", "7.5 Documented information", "8 Operation", "8.1 Operational planning and control", "8.2 Information security risk assessment", "8.3 Information security risk treatment", "9 Performance evaluation", "9.1 Monitoring, measurement, analysis and evaluation", "9.2 Internal audit", "9.3 Management review", "10 Improvement", "10.1 Nonconformity and corrective action", "10.2 Continual improvement" ] } }