ISO27035

ISO27035

Compliance standard for information security.

Total Requirements
3
defined requirements
Mapped Controls
0
control mappings
Overall Compliance
0%
0/0 controls compliant
Related Risks
0
0 critical · 0 high

Requirements Coverage

Incident Response Incident Response Procedures
Not mapped
Procedimentos de resposta a incidentes de segurança da informação
No controls mapped to this requirement
Incident Escalation Incident Escalation Process
Not mapped
Processo de escalação de incidentes
No controls mapped to this requirement
Incident Review Post-Incident Review
Not mapped
Revisão pós-incidente e lições aprendidas
No controls mapped to this requirement

Educational Content

Standard Overview

Compliance standard for information security.

How Compliance is Calculated

Compliance is calculated based on the maturity level of each control mapped to this standard. Controls with maturity level 3 or above are considered compliant. The overall compliance percentage represents the ratio of compliant controls to total mapped controls.

  • Compliant: Maturity level 3 or above
  • Partial: Maturity level 1-2
  • Non-compliant: Maturity level 0 (not implemented)
Best Practices for Implementation
  1. Conduct a gap analysis to identify areas needing improvement
  2. Prioritize controls based on risk assessment results
  3. Establish clear ownership and accountability for each control
  4. Implement continuous monitoring and regular reviews
  5. Document evidence of compliance for audit readiness
  6. Train staff on security awareness and standard requirements