top of page

![[ISO/IEC 27001 Series] - (Requirement 4.3) - Determining the scope of ISMS - Part 05](https://static.wixstatic.com/media/01f887_b3c9b5a243494c09b1a7a7729d0f493b~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/01f887_b3c9b5a243494c09b1a7a7729d0f493b~mv2.webp)
![[ISO/IEC 27001 Series] - (Requirement 4.3) - Determining the scope of ISMS - Part 05](https://static.wixstatic.com/media/01f887_b3c9b5a243494c09b1a7a7729d0f493b~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_avif,quality_auto/01f887_b3c9b5a243494c09b1a7a7729d0f493b~mv2.webp)
[ISO/IEC 27001 Series] - (Requirement 4.3) - Determining the scope of ISMS - Part 05
After covering requirements 5.1 , 4.1 e 4.2 , now is time to discuss requirement 4.3 "Determining the scope of ISMS": The requirement says that: "the organization must determine the boundaries and applicability of the information security management system to establish its scope". But what does this mean? To determine the scope, we need to consider internal and external issues, the need and expectations of interested parties and all interfaces and dependencies between the a

vitormaleite
Feb 23, 20252 min read
![[ISO/IEC 27001 Series] - (Requirement 4.2) - Understanding the needs and expectations of interested parties - Part 04](https://static.wixstatic.com/media/01f887_041cc95ab21b436cb98e877482ccd2b7~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/01f887_041cc95ab21b436cb98e877482ccd2b7~mv2.webp)
![[ISO/IEC 27001 Series] - (Requirement 4.2) - Understanding the needs and expectations of interested parties - Part 04](https://static.wixstatic.com/media/01f887_041cc95ab21b436cb98e877482ccd2b7~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_avif,quality_auto/01f887_041cc95ab21b436cb98e877482ccd2b7~mv2.webp)
[ISO/IEC 27001 Series] - (Requirement 4.2) - Understanding the needs and expectations of interested parties - Part 04
As we described in the earlier article, internal and external issues from the ISMS, we together understand the organization and its...

vitormaleite
Apr 30, 20242 min read
![[ISO/IEC 27001 Series] - (Requirement 4.1) - Understanding the organization and its context](https://static.wixstatic.com/media/nsplsh_2e68268dc57b43f3abf3e6770c228675~mv2.jpg/v1/fill/w_333,h_250,fp_0.50_0.50,q_30,blur_30,enc_avif,quality_auto/nsplsh_2e68268dc57b43f3abf3e6770c228675~mv2.webp)
![[ISO/IEC 27001 Series] - (Requirement 4.1) - Understanding the organization and its context](https://static.wixstatic.com/media/nsplsh_2e68268dc57b43f3abf3e6770c228675~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_avif,quality_auto/nsplsh_2e68268dc57b43f3abf3e6770c228675~mv2.webp)
[ISO/IEC 27001 Series] - (Requirement 4.1) - Understanding the organization and its context
Now that we have Top Management Support (Requirement 5.1) as we discussed before here , it is time to start to structuring our ISMS. Let’s go? We shall start from Requirement 4.1 as ISO/27001:2022 standard says: The organization shall determine relevant internal and external issues for those propose and who affects their capacity to achieve intended results fo their ISMS [...] But what does it mean? When we talk about internal issues the organization shall consider organizat

vitormaleite
Nov 19, 20233 min read


The role of top management as "parents"
The importance of parents Even if you're not a parent, you know that being a "parent" is no easy task. Following your child's growth,...

vitormaleite
May 1, 20232 min read


Classify information? Why bother?
Before we delve into the subject of this article, it's crucial to reflect on something highly important, as illustrated in the image...

vitormaleite
Jan 8, 20232 min read
![[ISO/IEC 27001 Series] - (Requirement 5) - Leadership](https://static.wixstatic.com/media/01f887_415ecf34af7e4879b4021f85c9fa958e~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/01f887_415ecf34af7e4879b4021f85c9fa958e~mv2.webp)
![[ISO/IEC 27001 Series] - (Requirement 5) - Leadership](https://static.wixstatic.com/media/01f887_415ecf34af7e4879b4021f85c9fa958e~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_avif,quality_auto/01f887_415ecf34af7e4879b4021f85c9fa958e~mv2.webp)
[ISO/IEC 27001 Series] - (Requirement 5) - Leadership
After introducing the standard and its structure in the previous article , today we'll begin to "run" the PDCA cycle, starting, of course, with the Planning phase. The standard has a well-organized structure, but I'll take the liberty to begin our discussion from requirement " 5.1 Leadership and Commitment ." And why start with this requirement? Precisely because an Information Security Management System (ISMS) will only achieve its objectives with the Support of Top Manageme

vitormaleite
Sep 25, 20222 min read


The importance of documentation
Some time ago, I came across a post on LinkedIn by a professional named Felipe Ramos, whom I don't know personally, but his insights...

vitormaleite
Sep 13, 20222 min read


Assets: The Heart of ISMS
Source: Photo by ThisisEngineering RAEng on Unplash In my recent daily readings on LinkedIn, I came across Aron Lange's post: Taking...

vitormaleite
Jun 6, 20222 min read
![[ISO/IEC 27001 Series] - Structure](https://static.wixstatic.com/media/01f887_865d642bbc4a4c4c90edd064f56c5cd6~mv2.png/v1/fill/w_624,h_250,fp_0.50_0.50,lg_1,q_35,blur_30,enc_avif,quality_auto/01f887_865d642bbc4a4c4c90edd064f56c5cd6~mv2.webp)
![[ISO/IEC 27001 Series] - Structure](https://static.wixstatic.com/media/01f887_865d642bbc4a4c4c90edd064f56c5cd6~mv2.png/v1/fill/w_454,h_182,fp_0.50_0.50,q_95,enc_avif,quality_auto/01f887_865d642bbc4a4c4c90edd064f56c5cd6~mv2.webp)
[ISO/IEC 27001 Series] - Structure
The ISO/IEC 27001 is an international standard that outlines a series of requirements for a company to implement an Information Security Management System (ISMS). Undoubtedly, this standard is my primary reference in my work. As I've heard before that standards can be challenging to study and understand, I've decided to break it down for you in this series of articles starting today, demonstrating that it's not as daunting as it might seem. The most recent version of this sta

vitormaleite
Mar 13, 20222 min read


Managing Information Security Policies
Definition and Structure To ensure we're on the same page, let's consider the definition that an Information Security Policy (ISP) is...

vitormaleite
Feb 1, 20222 min read
bottom of page