Published on February 22nd, 2020 📆 | 7290 Views ⚑0
Control Areas of ISO 27001 Internet Security Management Systems
Information security is one of the central concerns of the modern organization. The volume and value of the data used in everyday business increasingly informs how organizations work and how they are successful. To protect this information and be seen to be protecting more and more companies are becoming ISO 27001 certified.
ISO 27001 is an internationally recognized and independent specification for the Internet Security Management System. It provides a comprehensive checklist of security controls that will be considered for use in the context of information security control of the organization. ISO 27001 certification enables Interoute to demonstrate a safety control environment of robust information to manage safety and reduce the risk of consistent information in its activities.
Control Areas of ISO 27001:
Security Policy Management: Interoute offers a full range of security policies that define the security management principles in all our activities, and enabled us to obtain ISO 27001 certification for our certification Operations Center and the ISO 27001 or national equivalent for data center operations in Amsterdam, Berlin, Geneva and Stockholm.
Asset Management: Interoute maintains official inventories of information assets requiring protection by a comprehensive suite of policies, processes and security controls. This details all services and components platform, with pre-defined functional owners for maintenance, and are reviewed on an annual basis.
Physical and environmental security: Interoute ‘s enterprise systems are maintained in ISO 27001 certified data center with 24×7 security guards, CCTV and intrusion detection. Any physical access is restricted to employees Interoute.
Communication and Management: Interoute security policies cover the correct and secure operation of information processing facilities to protect and maintain the integrity and availability of information and information processing facilities, minimizing the risk of system failure. These include safeguards, segregation of duties, and additional security solutions in both Interoute systems, available to customers based on the requirements.
Access control: Interoute security policies cover the logical and physical access controls, as well as features of specific products to protect critical information. Access to data and systems is based on the principle of least privilege with the rights granted are based on functional responsibilities. This is regularly reviewed to ensure compliance with safety, and includes specific indexing process for any non-compliance.
Development and maintenance of systems: Interoute has integrated security at every stage of the system development life cycle with questions or non conformities degenerated into safety and risk management for the review and sanitation.