ISO/IEC 17799

ISO/IEC 17799: ISO/IEC 17799 was renumbered as ISO/IEC 27002. It provides guidelines for organizational information security standards and information security management practices, including the selection, implementation, and management of controls. By following the practices outlined in ISO/IEC 27002, organizations can help to protect the confidentiality, integrity, and availability of their information.

IT Asset Management (ITAM)

IT Asset Management (ITAM): The process of ensuring that all physical and digital assets within an organization, such as hardware, software, and digital licenses, are accurately tracked, used, and maintained throughout their lifecycle. This management process is crucial to mitigate risks associated with over or under-utilization, legal issues, and unaccounted resources. It assists in optimizing […]

ISO/IEC 18045

ISO/IEC 18045: An international standard that specifies the methodology for conducting security evaluations of information technology (IT) products, including the evaluation of security functional requirements as defined by the ISO/IEC 15408 series of standards, commonly known as the Common Criteria for Information Technology Security Evaluation. ISO/IEC 18045 provides guidance on the actions to be performed […]

IT Asset Management Lifecycle – Acquiring

IT Asset Management Lifecycle – Acquiring: The acquiring phase in the IT Asset Management (ITAM) lifecycle involves identifying requirements, selecting vendors, and purchasing IT assets. It includes assessing financial and operational impacts, as well as ensuring compliance with organizational policies and security standards. Proper acquisition strategies optimize spending and align new assets with business objectives.

ISO/IEC 20000-1

ISO/IEC 20000-1: An international standard for service management that specifies requirements for establishing, implementing, maintaining, and continually improving a Service Management System (SMS). Initially developed as BS15000, it ensures the delivery of consistent and quality services by supporting data security and business continuity.

IT Asset Management Lifecycle – Assigning Security

IT Asset Management Lifecycle – Assigning Security: In this phase, organizations allocate security measures to their IT assets to protect them against threats. This involves implementing controls like user authentication, encryption, and antivirus software according to the asset’s function and the data it manages. Continuous assessments are conducted to adapt to evolving threats.