Control objective: to control access to information
[2]
Control objective: to prevent unauthorized physical access, damage and interference to the organization premises and information.
[2]
The Organization uses security perimeters to protect areas that contain information and information processing facilities.
Control objective: to ensure that all employees, contractors and third party users understand their responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of theft, fraud or misuse of facilities.
[2]
Control objective: to achieve and maintain appropriate protection of organizational assets.
[2]
[2] Control objective: management of information security within the Organisation and establishment of a management framework for the initiation, implementation and control of the ISMS.
Control objective: The organization provides management direction and support for information security in accordance with business requirements and relevant laws and regulations of the Kingdom of Bahrain.
[2]
Links:
[1] http://www2.digi-sign.com/compliance/iso/27001/access%20control
[2] https://www.digi-sign.com/downloads/download.php?id=digi-cast-pdf
[3] http://www2.digi-sign.com/compliance/iso/27001/communications%20operations
[4] http://www2.digi-sign.com/compliance/iso/27001/environmental%20security
[5] http://www2.digi-sign.com/compliance/iso/27001/hr%20security
[6] http://www2.digi-sign.com/compliance/iso/27001/asset%20management
[7] http://www2.digi-sign.com/compliance/iso/27001/information%20security
[8] http://www2.digi-sign.com/compliance/iso/27001/security%20policy
[9] http://www2.digi-sign.com/compliance/iso/27001/risk%20framework
[10] http://www2.digi-sign.com/compliance/iso/27001/pdca
[11] http://www2.digi-sign.com/compliance/iso/27001/documentation
[12] http://www2.digi-sign.com/taxonomy/term/91
[13] http://www2.digi-sign.com/taxonomy/term/91?page=2