2
Mandatory Requirements
In the previous chapter, we spent some time learning what frameworks are and how we can use them to populate these frames (ISO 27001, NIST and so on)
In this chapter, if you were brave enough to follow me through all those acronyms and uncommon wording, you are probably eager to find out what’s next. We will spend the next pages learning how ISO 27001 works in the real world, then we will do the same for the NIST framework, and finally, we will see whether ISO 27001 and NIST can coexist.
In this chapter, we will cover the following topics:
- iSMS, controls, commitment, context, scope policy, and objectives
- Identify, Protect, Detect, Respond, and Recover
- Can ISO 27001 and NIST coexist?
iSMS, controls, commitment, context, ...
Get Cybersecurity and Privacy Law Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.