From the course: ISO 27001:2022-Compliant Cybersecurity: Getting Started

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

The information security management system (ISMS) and its scope (Clauses 4.3 and 4.4)

The information security management system (ISMS) and its scope (Clauses 4.3 and 4.4)

From the course: ISO 27001:2022-Compliant Cybersecurity: Getting Started

The information security management system (ISMS) and its scope (Clauses 4.3 and 4.4)

- [Instructor] Your information security management system, or ISMS, is the heart of an ISO 27001 compliance cyber security program. In this video, you'll learn what the ISMS is, how to define the scope of your ISMS and the ISO 27001 requirements related to it. Let's talk about the ISMS. This is not a system like a computer system. It's a management system. Think of the ISMS as the most comprehensive, well-documented, and highly functional information security program you've ever seen. It includes practically everything you can imagine your organization could need to protect its sensitive information. If you can achieve that, your ISMS may be compliant with ISO 27001. As we'll see in clauses 4.3 and 4.4, your ISMS needs to be explicitly defined. This is important because the way you define your ISMS will determine your ability to comply with ISO 27001. Clause 4.3 is determining the scope of the information security…

Contents