Tuv Rheinland Faq Iso 27001 en

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Image: TÜV Rheinland ©

FAQ – ISO 27001 Information Security


Our experts have answered frequently asked questions on
certification 27001 information security. Would you like to learn
more about ISO 27001? Feel free to contact us!

1 . W H AT A R E T H E A I M S O F I S O 2 7 0 0 1? ··Minimization of IT risks and potential damages


The aim of ISO 27001 is a consistent and centrally ··Exposure and elimination of weak areas
controlled management system for protecting information. ··Control of IT risks
In addition, threats to all business processes are reduced by ··Guaranteed satisfaction of compliance requirements
effective monitoring and control of IT security risks. ··Cost reduction
2 . W H AT A R E T H E B E N E F I T S O F I S O 2 7 0 0 1 3 . W H AT D O E S I S M S M E A N ?
C E R T I F I C AT I O N F O R M Y C O M PA N Y ? An information security management system (ISMS) is a
You will be protecting your organization from cyber attacks, systematic approach that takes into account both technical
loss of data and the resulting financial losses and damage and human factors. It will help you establish a continuous
to reputation. Legal protections are ensured and attacks optimization and surveillance process in your company, on
by hackers are reduced, alongside a minimization of the the basis of protection needs stipulated by you. ISO 27001
hacker’s ability to access sensitive information. Other describes the requirements of implementation in detail as
advantages of the ISO 27001 certification are: well as the documentation of an ISMS.
··Assured availability of your IT systems and processes
··Confidentiality of your information
··Competitive advantage

www.tuv.com/en
2

4. WHICH AREAS ARE ASSESSED FOR THE 4. Issuing the certificate


C E R T I F I C AT I O N I N A C C O R D A N C E W I T H I S O 2 7 0 0 1? If all criteria are met, your organization will receive the
··Information security guidelines ISO 27001 certificate. It certifies the compliance and
··Staff security functionality of your management system. In addition,
··Asset management your organizationwill be entered into our online
··Physical and environment-related security certificate database, Certipedia.
··Access control 5. Surveillance audits
··Cryptography Our annual surveillance audits will support you in the
··Operational security ongoing optimization of your IT processes.
··Communication security 6. Recertification
··Purchase, development and maintenance By recertifying before the end of three years, you
of systems sustainably continue your process of continual
··Supplier relationships improvement. In the long term you demonstrate to your
··Handling of information security incidents customers your dedication to a secure data center.
··Information security aspects of business
continuity management 6 . H O W L O N G I S M Y I S O 2 7 0 0 1 C E R T I F I C AT E VA L I D ?

··Compliance Your certificate is valid for three years. Thanks to the annual
surveillance audit and recertification before three years
5 . W H AT I S T H E C E R T I F I C AT I O N P R O C E S S I N have lapsed, your continual improvement process can be
A C C O R D A N C E W I T H I S O 2 7 0 0 1 F O R I N F O R M AT I O N ensured.
SECURITY?
Our experts test and certify your organization in the 7. H O W C A N O R G A N I Z AT I O N S A C H I E V E I N F O R M AT I O N
following steps: SECURITY?
1. Inventory/preliminary audit (optional) Organizations are required to equip their networks
Our auditors first record the current state of your according to minimum standards. In addition, technical
business on site. and organizational provisions need to be met to ensure the
2. Certification audit (level 1) availability, integrity, authenticity and confidentiality of data.
We evaluate and document your management system Hacker attacks must be reported immediately.
documents using an audit protocol. Amongst other
things, we identify and assess your premises and check 8 . H O W C A N I F I N D O U T W H E R E M Y O R G A N I Z AT I O N I S
your compliance with legal and official regulations. AT I N T E R M S O F I N T R O D U C I N G A N I S M S ?

® TÜV, TUEV and TUV are registered trademarks. Their use and exploitation requires prior consent.
3. Certification audit (level 2) In our “online quick check” you will receive a detailed
You demonstrate the practical application of your overview of the level your organization’s information
information security management system. Our auditors security management system has reached. After the test,
test it for appropriateness and effectiveness. At the end which only takes around 5-8 minutes, you will immediately
of the audit you will receive the results in a concluding receive an online score including a brief assessment. Do
meeting. the “online quick check” here.

O U R E X P E R T S W I L L B E H A P PY TO A S S I S T YO U W I T H A N Y F U R T H E R Q U E S T I O N S . P L E A S E G E T I N TO U C H W I T H U S!

TÜV Rheinland Systems

www.tuv.com/en

You might also like