Revision as of 09:59, 30 April 2021 by hw>Mlink-rodrigue (Created page with "This is a property of type Has type::Text. The allowed values for this property are: *Allows value::1 Scope *Allows value::2 Normative references *Allows...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

This is a property of type Text.

The allowed values for this property are:

  • 1 Scope
  • 2 Normative references
  • 3 Terms and definitions
  • 4 Context of the organization
  • 4.1 Understanding the organization and its context
  • 4.2 Understanding the needs and expectations of interested parties
  • 4.3 Determining the scope of the information security management system
  • 4.4 Information security management system
  • 5 Leadership
  • 5.1 Leadership and commitment
  • 5.2 Policy
  • 5.3 Organizational roles, responsibilities and authorities
  • 6 Planning
  • 6.1 Actions to address risks and opportunities
  • 6.2 Information security objectives and planning to achieve them
  • 7 Support
  • 7.1 Resources
  • 7.2 Competence
  • 7.3 Awareness
  • 7.4 Communication
  • 7.5 Documented information
  • 8 Operation
  • 8.1 Operational planning and control
  • 8.2 Information security risk assessment
  • 8.3 Information security risk treatment
  • 9 Performance evaluation
  • 9.1 Monitoring, measurement, analysis and evaluation
  • 9.2 Internal audit
  • 9.3 Management review
  • 10 Improvement
  • 10.1 Nonconformity and corrective action
  • 10.2 Continual improvement
The request is being processed and may take a moment. Preparing...
{ "type": "PROPERTY_CONSTRAINT_SCHEMA", "constraints": { "type_constraint": "_txt", "allowed_values": [ "1 Scope", "2 Normative references", "3 Terms and definitions", "4 Context of the organization", "4.1 Understanding the organization and its context", "4.2 Understanding the needs and expectations of interested parties", "4.3 Determining the scope of the information security management system", "4.4 Information security management system", "5 Leadership", "5.1 Leadership and commitment", "5.2 Policy", "5.3 Organizational roles, responsibilities and authorities", "6 Planning", "6.1 Actions to address risks and opportunities", "6.2 Information security objectives and planning to achieve them", "7 Support", "7.1 Resources", "7.2 Competence", "7.3 Awareness", "7.4 Communication", "7.5 Documented information", "8 Operation", "8.1 Operational planning and control", "8.2 Information security risk assessment", "8.3 Information security risk treatment", "9 Performance evaluation", "9.1 Monitoring, measurement, analysis and evaluation", "9.2 Internal audit", "9.3 Management review", "10 Improvement", "10.1 Nonconformity and corrective action", "10.2 Continual improvement" ] } }