Home   |   Technical Articles

Technical Articles

What is ISO 23247:2012?

ISO 23247:2012 is a technical standard that specifies the requirements for the design, development, and management of information security controls based on the principles of risk assessment and mitigation. This international standard provides organizations with a framework to establish, implement, maintain, and continually improve their information security management system.

The Purpose of ISO 23247:2012

The primary purpose of ISO 23247:2012 is to provide guidance for organizations in establishing and maintaining effective information security controls to protect their assets from potential threats and vulnerabilities. By implementing the requirements outlined in this standard, organizations can reduce the likelihood and impact of security incidents, ensuring the confidentiality, integrity, and availability of their information.

Key Features and Benefits

ISO 23247:2012 emphasizes a risk-based approach to information security, requiring organizations to identify and assess potential risks and implement appropriate controls to mitigate them. Some key features and benefits of this standard include:

Comprehensive Risk Management: ISO 23247:2012 helps organizations develop a systematic and structured approach to identifying, assessing, and treating information security risks.

Legal and Regulatory Compliance: By complying with this standard, organizations can demonstrate their adherence to legal and regulatory requirements related to information security.

Improved Business Continuity: Implementing effective information security controls reduces the likelihood of disruptions and ensures the continuity of business operations.

Enhanced Customer Trust and Confidence: ISO 23247:2012 certification demonstrates an organization's commitment to protecting customer information, leading to increased trust and confidence among stakeholders.

Continuous Improvement: The standard encourages organizations to continually monitor and review their information security controls, making it easier to adapt to emerging threats and vulnerabilities.

Implementing ISO 23247:2012

Implementing ISO 23247:2012 involves several key steps. Firstly, organizations need to establish the context for their information security management system, including defining the scope, objectives, and applicable legal and regulatory requirements. Next, they should conduct a risk assessment to identify potential threats and vulnerabilities.

Based on the results of the risk assessment, appropriate controls should be selected and implemented. These controls may involve technical measures, such as firewalls and encryption, as well as operational and organizational measures, such as policies, procedures, and training programs.

Once the controls are in place, organizations should regularly monitor and evaluate their effectiveness. This includes conducting internal audits and management reviews to identify areas for improvement. By continually reviewing and improving their information security controls, organizations can maintain compliance with ISO 23247:2012 and effectively protect their information assets.

Contact Us

Contact: Nina She

Phone: +86-13751010017

Tel: +86-755-33168386

Add: 1F Junfeng Building, Gongle, Xixiang, Baoan District, Shenzhen, Guangdong, China

close
Scan the qr codeClose
the qr code