An organization that is implementing the ISMS based on ISO/IEC 27001 has defined and communicated secure system architecture and engineering principles. However, there is no documented information related to these principles. Is this acceptable?
Scenario 3: Socket Inc. is a dynamic telecommunications company specializing in wireless products and services, committed to delivering high-quality and secure communication solutions. Socket Inc. leverages innovative technology, including the MongoDB database, renowned for its high availability, scalability, and flexibility, to provide reliable, accessible, efficient, and well-organized services to its customers. Recently, the company faced a security breach where external hackers exploited the default settings of its MongoDB database due to an oversight in the configuration settings, which had not been properly addressed. Fortunately, diligent data backups and centralized logging through a server ensured no loss of information. In response to this incident, Socket Inc. undertook a thorough evaluation of its security measures. The company recognized the urgent need to improve its information security and decided to implement an information security management system (ISMS) based on ISO/IEC 27001.
To improve its data security and protect its resources, Socket Inc. implemented entry controls and secure access points. These measures were designed to prevent unauthorized access to critical areas housing sensitive data and essential assets. In compliance with relevant laws, regulations, and ethical standards, Socket Inc. implemented pre-employment background checks tailored to business needs, information classification, and associated risks. A formalized disciplinary procedure was also established to address policy violations. Additionally, security measures were implemented for personnel working remotely to safeguard information accessed, processed, or stored outside the organization's premises.
Socket Inc. safeguarded its information processing facilities against power failures and other disruptions. Unauthorized access to critical records from external sources led to the implementation of data flow control services to prevent unauthorized access between departments and external networks. In addition, Socket Inc. used data masking based on the organization's topic-level general policy on access control and other related topic-level general policies and business requirements, considering applicable legislation. It also updated and documented all operating procedures for information processing facilities and ensured that they were accessible to top management exclusively.
The company also implemented a control to define and implement rules for the effective use of cryptography, including cryptographic key management, to protect the database from unauthorized access. The implementation was based on all relevant agreements, legislation, regulations, and the information classification scheme. Network segregation using VPNs was proposed to improve security and reduce administrative efforts.
Regarding the design and description of its security controls, Socket Inc. has categorized them into groups, consolidating all controls within a single document. Lastly, Socket Inc. implemented a new system to maintain, collect, and analyze information about information security threats and integrate information security into project management.
Based on the scenario above, answer the following question:
Which of the following physical controls was NOT included in Socket Inc.'s strategy?
How should the level of detail in risk identification evolve over time?7
ISO/IEC 27005:2022 (Clause 8.2.1 -- Risk Identification Process) and the ISMS Implementation Toolkit emphasize that risk identification is a cyclical and iterative process:
''Risk identification should evolve with organizational maturity and environmental change, becoming more detailed and effective through each cycle.''
This aligns with Clause 10.1 of ISO/IEC 27001:2022, which requires continual improvement:
''The organization shall continually improve the suitability, adequacy and effectiveness of the information security management system.''
Refining detail over time allows organizations to adjust to new threats and better understand their environment, promoting resilience and continual improvement.
ISO/IEC 27005:2022 Clause 8.2.1 -- Risk Identification
ISO/IEC 27001:2022 Clause 10.1 -- Continual Improvement===========
Which of the following steps is necessary to effectively implement information security controls?
HealthGenic is a pediatric clinic that monitors the health and growth of individuals from infancy to early adulthood using a web-based medical software. The software is also used to schedule appointments, create customized medical reports, store patients' data and medical history, and communicate with all the [^involved parties, including parents, other physicians, and the medical laboratory staff.
Last month, HealthGenic experienced a number of service interruptions due to the increased number of users accessing the software Another issue the company faced while using the software was the complicated user interface, which the untrained personnel found challenging to use.
The top management of HealthGenic immediately informed the company that had developed the software about the issue. The software company fixed the issue; however, in the process of doing so, it modified some files that comprised sensitive information related to HealthGenic's patients. The modifications that were made resulted in incomplete and incorrect medical reports and, more importantly, invaded the patients' privacy.
Which situation presented in scenario 8 is not in compliance with ISO/IEC 27001 requirements?
Sabine
Bettyann
7 days agoLaticia
17 days agoLeigha
24 days agoGlendora
1 month agoArletta
1 month agoKallie
2 months agoBettina
2 months agoGwenn
2 months agoGilberto
2 months agoAntione
2 months agoTijuana
3 months agoDwight
3 months agoDelbert
3 months agoJohanna
3 months agoTamekia
4 months agoMarvel
4 months agoFloyd
4 months agoLaticia
5 months agoErinn
5 months agoRebbecca
5 months agoCorrinne
5 months agoTrina
5 months agoTonja
6 months agoLino
6 months agoRex
6 months agoLili
6 months agoRosenda
6 months agoBrock
8 months agoClarence
8 months agoArgelia
9 months agoAriel
9 months agoMeghann
10 months agoKati
11 months agoMarion
11 months agoCharolette
11 months agoCarisa
12 months agoSalome
12 months agoFrancoise
1 year agoKimberely
1 year agoMelinda
1 year agoWeldon
1 year agoTheodora
1 year agoChun
1 year agoShannan
1 year agoAlayna
1 year agoJina
1 year agoKing
1 year agoAngella
1 year agoXochitl
1 year agoReita
1 year agoDominga
1 year agoBernardine
1 year agoMarnie
1 year agoLai
1 year agoStefanie
1 year agoCarol
1 year agoBrandee
1 year agoCathrine
1 year agoBarabara
1 year agoMary
1 year agoLuisa
1 year agoFiliberto
1 year agoAndra
1 year agoCiara
2 years agoSantos
2 years agoCelestina
2 years agoAlayna
2 years agoRosio
2 years agoPauline
2 years agoCassie
2 years agoAnnice
2 years agoSherell
2 years agoDan
2 years agoDorothy
2 years ago