Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Maintaining contact with cloud-related special interest groups

Critical
High
Normal
Low

The organization should actively maintain contacts with cloud-related stakeholders and other relevant parties related to the organization's operations.

Connected other frameworks and requirements:
6.1.4: Contact with special interest groups
ISO 27017
ID.RA-2: Cyber threat intelligence
NIST CSF

Procedures and data sources for gathering reliable information about malware

Critical
High
Normal
Low

The organization has defined policies that regularly collect up-to-date and reliable information about malware. Such can be e.g. mailing lists, magazines, blogs from security software vendors, or security news sites.

The purpose of the data sources is to verify the information on malware, to distinguish the scams from real malware and to ensure that the warnings received are truthful and informative.

Connected other frameworks and requirements:
12.2.1: Controls against malware
ISO 27001
12.2: Protection from malware
ISO 27001
ID.RA-2: Cyber threat intelligence
NIST CSF
8.7: Protection against malware
ISO 27001

Contact with industry-specific interest groups

Critical
High
Normal
Low

The organization shall actively maintain contacts with stakeholders relevant to the organization's operations and other relevant actors related to the organization's operations and security.

The goal is especially to:

  • increase knowledge of best practices and keep up to date with relevant security information
  • ensure that organisation's understanding of the security environment is up-to-date and complete
Connected other frameworks and requirements:
6.1.4: Contact with special interest groups
ISO 27001
ID.RA-2: Cyber threat intelligence
NIST CSF
RS.CO-5: Voluntary information sharing
NIST CSF
RC.CO-1: Public relations
NIST CSF
5.6: Contact with special interest groups
ISO 27001
No items found.