Cyber Security Policy Review
What is Included in Our Cyber Security Policy Review?
Now that you know how our security policy review works, you may be interested to know what is included within it. The report includes:
- A comprehensive gap analysis
- Plain language recommendations
It is also based on:
- Your current policy
- Risk management
- Your business
This service uses the international information security management systems standard, ‘ISO/IEC 27001:2013’ as a model for security policy reviews. This allows us to identify any gaps and ensure that policy, procedure and technical controls implemented by your organisation are based on coherent risk management.
In this assessment, we’ll look at:
- Your current security policy review
- How your security policy is written
- How your security policy is implemented
Do We Have Any Other Recommendations?
The IASME Trusted Partner network can provide additional support (e.g. Business Continuity Management Systems certification)They are also certifying bodies for the Cyber Essentials and Cyber Essentials Plus schemes so can help you achieve these too.