
ISO 27041:2015
ISO 27041:2015 Information technology – Security techniques – Guidance on assuring suitability and adequacy of incident investigative method
CDN $173.00
Description
ISO/IEC 27041:2015 provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are “fit for purpose”. It encapsulates best practice on defining requirements, describing methods, and providing evidence that implementations of methods can be shown to satisfy requirements. It includes consideration of how vendor and third-party testing can be used to assist this assurance process.
This document aims to
? provide guidance on the capture and analysis of functional and non-functional requirements relating to an Information Security (IS) incident investigation,
? give guidance on the use of validation as a means of assuring suitability of processes involved in the investigation,
? provide guidance on assessing the levels of validation required and the evidence required from a validation exercise,
? give guidance on how external testing and documentation can be incorporated in the validation process.
Edition
1
Published Date
2015-06-19
Status
PUBLISHED
Pages
18
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
ISO/IEC 27041:2015 provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are "fit for purpose". It encapsulates best practice on defining requirements, describing methods, and providing evidence that implementations of methods can be shown to satisfy requirements. It includes consideration of how vendor and third-party testing can be used to assist this assurance process.
This document aims to
? provide guidance on the capture and analysis of functional and non-functional requirements relating to an Information Security (IS) incident investigation,
? give guidance on the use of validation as a means of assuring suitability of processes involved in the investigation,
? provide guidance on assessing the levels of validation required and the evidence required from a validation exercise,
? give guidance on how external testing and documentation can be incorporated in the validation process.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 27006:2024 Information security, cybersecurity and privacy protection – Requirements for bodies providing audit and certification of information security management systems – Part 1: General
CDN $312.00 Add to cart -

ISO 20243:2023 Information technology – Open Trusted Technology ProviderTM Standard (O-TTPS) – Part 1: Requirements and recommendations for mitigating maliciously tainted and counterfeit products
CDN $273.00 Add to cart -

ISO 27557:2022 Information security, cybersecurity and privacy protection – Application of ISO 31000:2018 for organizational privacy risk management
CDN $233.00 Add to cart -

ISO 27007:2020 Information security, cybersecurity and privacy protection – Guidelines for information security management systems auditing
CDN $312.00 Add to cart







