Remove Asset Management Remove Gap Analysis Remove Vulnerability
article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

8 – Asset Management. Asset Management, Annex A.8 This section addresses how organizations define acceptable information protection obligations and identify information assets. Technical vulnerability management is covered in Annex A.12.6, How Do You Perform a Gap Analysis?

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

SR – Supply Chain Risk Management : Managing risks from the supply chain to reduce vulnerabilities. Identify: Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. You’ve identified and documented the vulnerabilities to your assets.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

SR – Supply Chain Risk Management : Managing risks from the supply chain to reduce vulnerabilities. Identify: Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. You’ve identified and documented the vulnerabilities to your assets.