ALL >> Business >> View Article
Bs7799 Common Practices

The BS7799 Part I and the ISO 1779 basically provides only recommendations for ISMS and are available for use to all who are responsible for the initiation, implementation and management of information security in any organization. The BS7799 implementation provides for confidence and trust in inter and intra organizational communications, dealings and trading. These provide for code of practice which was formulated on the best practices of some of the top blue chip organizations of the world. The two standards provide for 36 security objectives and 127 security controls which are the building blocks of any ISMS in any organizations.
Some of the best practiced controls are;
• Policy document on Information Security
• Responsibility allocation for security of information
• Training and education on information security
• Reporting security breaches
• Disaster management and continuity of business.
Some factors are very critical in nature and should be taken care of while implementing the ISMS in an organization. ...
... These are;
• Integration of security policy and its objectives with the overall business objectives;
• Implementation of security culture which is relevant in the context of organizational culture;
• Managements support and commitment to implement IS;
• Risk understanding and management;
• Distribution of written guidelines for the employees in respect of security policy;
• Provision of training and education to employees;
• Measurement of performance in quantifiable terms of the ISMS.
Security requirements in all size of organizations is derived physical security of information; statutory and contractual requirement; and lastly form those objectives and requirements of information security which the organization has, over the period of time, developed to support its existing business operations. The contractual and statutory requirements may require the organizations to comply with the privacy laws of the country; the intellectual property laws in force; and specially safeguard of the knowledge bank of the organization.
About Author:
Sam Wilcox has more articles published such as What is MTTR and What is MTBF. Visit BS7799 Common Practices.
Add Comment
Business Articles
1. Lucintel Forecasts The Global Wall-mounted Ac Ev Charger Market To Grow With A Cagr Of 22.4% From 2025 To 2031Author: Lucintel LLC
2. Technology Landscape, Trends And Opportunities In Global 3d Printing Photopolymer Market
Author: Lucintel LLC
3. Lucintel Forecasts The Global Smart Home Market To Reach $372 Billion By 2030
Author: Lucintel LLC
4. Second Marriage Matrimonial – Verified Matches & Free Registration
Author: Truelymarry
5. Core: Leading The Way In Managed It Services For Businesses Across London
Author: IT Management
6. The Role And Function Of A Collection Agency
Author: Bennett Carter
7. Understanding Debt Collection Agencies: What They Do And How They Affect Consumers
Author: Bennett Carter
8. How To Use An Smm Panel Effectively For Fast Social Media Growth
Author: Smm Panel
9. Essential Tips For Beginners And The Power Of Professional Editing
Author: Sam
10. How To Improve Field Staff Efficiency With Geolocation Tools
Author: TrackHr App
11. Building An Effective Energy Management System
Author: Jane
12. Internal Auditor Training: The Key To Effective Risk Management And Compliance
Author: Sqccertification
13. Why Accurate Accounting In Property Management Is The Key To Higher Roi
Author: Harsh Vardhan
14. Kaal Sarp Puja In Trimbakeshwar – Benefits, Process & Trusted Pandit Contact
Author: Pandit Milind Guruji
15. Data Entry Vs. Data Processing: What’s The Difference And Why It Matters
Author: Allianze BPO