MindMap Gallery ISO IEC 27001 2013 PIE FARM METHODOLOGY
This is a mind map talking about iso/iec 27001:2013 pie farm methodology. You can create a mind map like this effortlessly.
Edited at 2020-09-25 12:56:08Halloween has many faces. The theme you envision should influence how you decorate the party space. Jack-o'-lanterns and friendly ghosts are more lighthearted Halloween characters. Zombies, witches, and vampires are much darker. If you want to celebrate all the fun sides of Halloween, then it’s okay to mesh the cute with the frightening. Here is a mind map which lists down the 39 Cutest Couples Halloween Costumes of 2021.
Halloween simply wouldn't be Halloween without the movies that go along with it. There's nothing like a movie night filled with all the greatest chainsaw-wielding, spell-binding, hair-raising flicks to get you in the spooky season spirit. So, break out the stash of extra candy, turn off all the lights, lock every last door, and settle in for the best of the best Halloween movies. Here are the 35 Halloween movies listed on the mind map based on the year of release.
This mind map contains lots of interesting Halloween trivia, great tips for costumes and parties (including food, music, and drinks) and much more. It talks about the perfect Halloween night. Each step has been broken down into smaller steps to understand and plan better. Anybody can understand this Halloween mind map just by looking at it. It gives us full story of what is planned and how it is executed.
Halloween has many faces. The theme you envision should influence how you decorate the party space. Jack-o'-lanterns and friendly ghosts are more lighthearted Halloween characters. Zombies, witches, and vampires are much darker. If you want to celebrate all the fun sides of Halloween, then it’s okay to mesh the cute with the frightening. Here is a mind map which lists down the 39 Cutest Couples Halloween Costumes of 2021.
Halloween simply wouldn't be Halloween without the movies that go along with it. There's nothing like a movie night filled with all the greatest chainsaw-wielding, spell-binding, hair-raising flicks to get you in the spooky season spirit. So, break out the stash of extra candy, turn off all the lights, lock every last door, and settle in for the best of the best Halloween movies. Here are the 35 Halloween movies listed on the mind map based on the year of release.
This mind map contains lots of interesting Halloween trivia, great tips for costumes and parties (including food, music, and drinks) and much more. It talks about the perfect Halloween night. Each step has been broken down into smaller steps to understand and plan better. Anybody can understand this Halloween mind map just by looking at it. It gives us full story of what is planned and how it is executed.
ISO/IEC 27001:2013 PIE FARM METHODOLOGY
1. PLAN AND PREPARE
Management support
Obtain management interest
Clarify organization’s priorities
Define security objectives
Create business case and project plan
Identify roles and responsibilities
Get approval from the management
2. IDENTIFICATE & ISOLATE
Scoping
Define organizational scope
Organizational units: department, service project, subsidiary, etc.
Organizational structures and responsibilities of managers
Business Process: Sales management. Procurement process, hiring, etc
Define physical scope
All physical locations, both internal and external, that are included in the ISMS should be considered.
Identify area (data centre/server rooms/specific area)
In the case of outsourced physical sites, the interfaces with the ISMS and the applicable service agreements have to be considered.
Define technology scope
Networks: internal networks, wireless networks, etc.
Operating Systems: Windows, Linux, etc.
Applications: CRM, software management payroll, ERP. utilities, database
Data: customer records, medical data, research and development, etc.
Processes: Consider processes that transport, store or process information.
Telecommunications equipment: routers, firewalls, etc.
Changes in scope
Evaluated
Approved
Documented
Create inventory lists
Identify assets
Identify asset owner and information classification
Create SOA
Statement Of Applicability
Select the relevant controls from the standard
Create a document with the objectives/exceptions for the selected controls
Create a document with the objectives/exceptions for the selected controls
Defines which controls from ISO/IEC 27001:2013 are selected for implementation
ISO/IEC 27001:2013 does not specify the form of the SOA
Good practice: Include the title or function of the responsible person, per control and list of the documents or records relating to it
3. EVALUATE
Perform gap analysis
Conduct external assessments
technology perimeter assessment
physical security assessment
Conduct internal assessments
assessment of critical applications
Review departmental processes
interview department head
interview mid-level employee in the department
analyse process and practices
Risk Management
Risk Register
RTP
Risk Treatment Plan
Risk Treatment Plan
Risk Assessment Document
Perform risk assessment
Subtopic Create a risk treatment policy
Define a risk calculation procedure
Calculate the risk
Identify controls to mitigate (remove/reduce/transfer) identified risks
Risk Assessment Procedure
Procedure for Risk Calculation
Risk Management Policy
Risk Management
Procedure for Risk Calculation
Perform risk assessment
Subtopic Create a risk treatment policy
Define a risk calculation procedure
Calculate the risk
Identify controls to mitigate (remove/reduce/transfer) identified risks
Create Risk Treatment Plan (RTP)
Create a risk treatment plan
Obtain management approval
4. FIX
Create ISMS (Policies, Procedures, Training & Reports)
Create security policy
Change Management Policy
Obtain management approval
Incident Handling Policy
Obtain management objectives
Wireless Security Policy
Acceptable Use Policy
Refer individual policies
Internet Use Policy
Email Use Policy
Mobile Use Policy
Create the policy
Security Policy
Obtain management objectives
Create the policy
Refer individual policies
Obtain management approval
Create all referenced individual policies
Create procedure documents
Publish the policies
Conduct awareness training
Management review/Internal report
Subtopic 1Review all documentation
Review SOA, RTP and policies
Review controls
Measure effectiveness
5. ASSESS
Pre-certification audit
Conduct a mock audit
Identify all Non-Conformities(NCs)
Take relevant actions to close identified NCs
Identify and contact a certification body for the audit
Certification
Phase 1
Document review
1 day
Mandatory
Phase 2
Control review
Multi-day based on scope
Mandatory
1 day
Mandatory
Control review
Multi-day based on scope
Mandatory
6. REPORT
Accredited body reports on any non conformities or areas requiring improvement
7. MAINTAIN
Organisation's Security Steering Committee has a post-assessment wash up meeting
Security Steering Committee schedules regular review meetings
People with specific duties and responsibilities, schedule their actions for ongoing maintenance
Consider the use of a suitable Governance, Risk & Compliance platform
Regularly test the Business Continuity Plan (BCP) and Security Incident Response Plan (SIRP)
Carry out periodic internal audits
Carry out periodic due diligence activities on all 3rd parties
Source