We assess and document compliance to:

  1. H.I.P.A.A.

  2. Sarbanes-Oxley (SoX)

  3. Gramm-Leach-Bliley Act (GLBA)

  4. Payment Card Industry (PCI) Data Security Standard

  5. N.I.S.T SP 800-30

  6. I.S.O. 27001/I.S.O. 17799

  7. SAS 70

  8. FERPA

  9. FISMA

  10. NERC

  11. Safe Harbor Act

ISO 27001 (formerly BS7799)

ISO17799 and BS7799 are security policies and standards procedures. The standard was initially known as a British standard called BS 7799, developed by the British Standards Institution. Later, it became the ISO IEC 17799 standard when it was adopted by the ISO IEC technical committee for international use.

This standard defines a set of recommended information security management practices, although it is probably better to say the standard is a set of recommendations, as the ISO IEC recommends that you consider each suggestion as you try to improve your information security program, and not view each suggestion as an inflexible obligation to follow.

Depending on your information security needs you may accept or not accept the BS7799 standards. If a particular recommendation helps you to address any important security matter then accept it, otherwise, ignore it. ISO17799 and BS7799 include an open approach to most of the common information issues related to electronic files, data files and software files, and paper documents. Information related to hand written notes, printed materials and photographs, recordings, video recordings and audio recordings, general communications including conversations, telephone conversations, cell phone conversations and face to face conversations, as well as messages such as email messages, fax messages, instant messages, video messages, physical messages, among many other items are considered as definition of the term "information".

Since the information has value and is therefore an asset, it needs to be protected just like any other corporate asset. Information should be protected just as the infrastructure that supports this information, including all the networks, systems, and functions that allow an organization to manage and control its information assets. BS7799 explains what you can do to protect your organization's information assets.

Today, organizations are faced with a wide range of security threats, from equipment failure to human errors, fraud, vandalism, theft, sabotage, flood, fire, and even terrorism in many countries, that is way the information needs to be protected. BS7799 suggests focusing your attention on three main points to guarantee your information security, which are integrity, confidentiality and availability. Integrity refers to the need to protect the completeness and accuracy of the information as well as the methods used to process it. Confidentially refers to the assurance that the information can only be accessed by the people who have the authorization to do so. And availability refers to the guarantee that those who have been authorized to use the information have access to it and all associated assets when needed.

To identify your information security risks and needs, you may need to perform a risk assessment. The best way to truly assess this information is to study any legal requirements as well as determining what your own requirements are to develop or improve your own information security program.

ISO 27001 (formerly BS7799) describes a 6 stage process

1) Define an information security policy

2) Define scope of the information security management system

3) Perform a security risk assessment

4) Manage the identified risk

5) Select controls to be implemented and applied

6) Prepare an SoA (a "statement of applicability").

Please submit your payment of $999.00 for a complete Regulatory Compliance Assessment for one applicable regulation.

Business Name:
Contact Information:
Email Address:
URL or IP address:

Other members of our business group:
Cloud-Security.us | US-scada.com

COPYRIGHT (C) 2000 - 2011 InfoSecPro.com ALL RIGHTS RESERVED