0

Your Cart is Empty

ISMS 8.9 - Configuration Management Program

Have Questions?
Talk to a MorganHill Expert at 214-784-8232

Document Name: ISMS 8.9 - Configuration Management Program

Overview: ISMS document detailing various requirements as noted by Controls8.927002:2022 regarding configuration management. 

Specifically, the document includes the following sections:

(1). Configuration Management Planning. (2). Training Requirements. (3). Automated Tools and Software Usage. (4). Security Posture. (5). Baseline Configuration Standards. (6). Insecure Services, Ports, Protocols. (7). Review and Update of Baseline Configurations. (8). Automated Mechanisms for Baseline Configurations. (9). Retention of Previous Baseline Configurations. (10). Baseline Configurations for High-Risk Areas. (11). Least Functionality. (12). Periodic Review. (13). Prevention of Program Execution. (14). Authorized Software and Whitelisting. (15). Asset Inventory. (16). Unauthorized Component Detection. (17). Access Control for Changes. (18). Access Enforcement. (19). Reviewing System Changes. (20). Signed Components. (21). IMPLEMENTATION OF SECURE CONFIGURATIONS. (22). CONFIGURATION CHANGE CONTROL. (23). CONTINUOUS MONITORING.

      ISMS Section: ISO/IEC 27001:2022 Annex A Controls and Section 8 - Technological Controls

      Control Mapping: Control 8.9 - 27002: 2022

      Format: Microsoft Word

      Length: 13 pages.

       



      Companies Who Trust Us

      ACE Hardware Logo
      The YMCA Logo
      Keller Williams Logo
      BlueCross BlueShield Logo
      evision Logo
      University of Oklahoma Logo
      Lloyd's Logo
      Sigma Sense Logo
      JPay Logo
      State of Utah Seal
      Argo AI Logo