Skip to content
Back Home
  • Home
  • Store
    • Management Systems
      • Information Security Management Systems
        • ISO 27001
        • NIST 800-53 REV 5
        • AICPA TSC 2017
    • My account
    • Cart
    • Checkout
  • Management Systems
    • Information Security Management Systems
      • ISO 27001
      • AICPA TSC (SOC)
      • NIST
  • Search
Back Home
  • Search
  • Home
  • Store
    • Management Systems
      • Information Security Management Systems
        • ISO 27001
        • NIST 800-53 REV 5
        • AICPA TSC 2017
    • My account
    • Cart
    • Checkout
  • Management Systems
    • Information Security Management Systems
      • ISO 27001
      • AICPA TSC (SOC)
      • NIST

Introduction: In today’s interconnected business world, organizations rely on their suppliers to provide goods and services that are critical to their operations.  However, with this reliance comes the need for organizations to ensure that their suppliers meet the necessary security requirements.  This involves monitoring and reviewing supplier services to identify […]

Checklist of ISO/IEC 27001-A.15.2.1 Monitoring and review of supplier services

Introduction: With the increasing reliance on information and communication technology (ICT) to run businesses, organizations need to ensure the security and integrity of their ICT supply chain.  However, this can be a challenging task, especially when parts of the supply chain are subcontracted.  It is crucial to verify the security […]

Checklist of ISO/IEC 27001-A.15.1.3 Information and communication technology supply chain

Introduction: In today’s interconnected business environment, supplier relationships play a critical role in ensuring the smooth functioning of any organization.  However, these relationships also come with inherent risks, particularly when it comes to information security.  Cyberattacks and data breaches are becoming increasingly common, and organizations must take proactive steps to […]

Checklist of ISO/IEC 27001-A.15.1.2 Addressing security within supplier agreements

Introduction: Organizations rely heavily on their suppliers to deliver various products and services.  However, this dependence on suppliers brings with it significant information risks and security concerns.  The A.15.1.1 Information Security Policy for Supplier Relationships is a critical requirement of ISO/IEC 27001, which emphasizes the importance of reviewing policies, processes, […]

Checklist of ISO/IEC 27001-A.15.1.1 Information security policy for supplier relationships

Introduction: Protection of data is a critical aspect of information security, and this applies to all stages of data management, including testing.  Test data is crucial in validating the effectiveness and efficiency of systems and applications, ensuring that they function as expected.  However, the use of operational data for testing […]

Checklist of ISO/IEC 27001-A.14.3.1 Protection of test data

Introduction: System acceptance testing is a critical component of ensuring that new systems introduced to a network meet the required standards for IT security.  This process includes a comprehensive review of the testing procedures, the quality of tests, and the acceptance criteria for new or updated systems.  The testing procedures […]

Checklist of ISO/IEC 27001-A.14.2.9 System acceptance testing

Introduction: The security of a system is of utmost importance for any organization. In order to ensure that the system is secure, it is necessary to perform regular security checks and testing.  This is where the A.14.2.8 control from the ISO/IEC 27001 standard comes into play.  This control requires a […]

Checklist of ISO/IEC 27001-A.14.2.8 System security testing

Introduction: Outsourcing development has become a popular trend in the software industry.  However, it is important to ensure that outsourced software is developed in a secure and compliant manner.  To achieve this, it is crucial to have controls in place that help mitigate risks associated with outsourced software development.  A.14.2.7 […]

Checklist of ISO/IEC 27001-A.14.2.7 Outsourced development

Introduction: Secure software development has become a crucial aspect of protecting sensitive information and maintaining the confidentiality, integrity, and availability of systems.  Information security management standard, ISO 27001, contains several controls related to secure software development.  A.14.2.6 is one such control that pertains to the creation of a secure development […]

Checklist of ISO/IEC 27001-A.14.2.6 Secure development environment

Introduction: Technology is at the forefront of almost everything we do, from online shopping to banking, from socializing to working remotely.  As such, it’s more important than ever to ensure that the software and systems we use are secure and protected from cyber threats.  The A.14.2.5 control from the ISO/IEC […]

Checklist of ISO/IEC 27001-A.14.2.5 Secure system engineering principles

© 2025 Systemi.se – All rights reserved

Powered by WP – Designed with the Customizr theme