From the course: ISO 27001:2013-Compliant Cybersecurity: Getting Started

Unlock the full course today

Join today to access over 22,800 courses taught by industry experts or purchase this course individually.

The Information security management system (ISMS) and its scope (Clauses 4.3 and 4.4)

The Information security management system (ISMS) and its scope (Clauses 4.3 and 4.4)

From the course: ISO 27001:2013-Compliant Cybersecurity: Getting Started

Start my 1-month free trial

The Information security management system (ISMS) and its scope (Clauses 4.3 and 4.4)

- [Instructor] Your information security management system or ISMS is the heart of an ISO 27001 compliant cybersecurity program. In this video, you'll learn what the ISMS is how to define the scope of your ISMS and the ISO 27001 requirements related to it. Let's talk about the ISMS. This is not a system like a computer system, it's a management system. Think of the ISMS as the most comprehensive, well documented, and highly functional, information security program you've ever seen. It includes practically everything you can imagine your organization could need to protect its sensitive information. If you can achieve that your ISMS may be compliant with ISO 27001. As we'll see in clauses 4.3 and 4.4 your ISMS needs to be explicitly defined. This is important because the way you define your ISMS will determine your ability to comply with ISO 27001. Clause 4.3 is determining the scope of the information security…

Contents