methodology

1.0


Methodology

The main goal of the methodology is to help organizations adapt to changes in the field of cybersecurity and strengthen their protection against threats.Our methodology aims to enhance the level of information security in organizations and create a secure digital environment. The process includes analyzing current security measures, assessing their effectiveness, and implementing new solutions in accordance with regulatory requirements and international standards.

Imagine that we are officials responsible for ensuring information security, or wish to become them in the future.

What do you need to know and be able to do for this? Let's figure it out together!

Disclaimer: The authors do not claim absolute accuracy in the materials on information security (from the perspective of current regulatory legal acts of the Republic of Kazakhstan). The aim of the work is to improve the protection of your systems and raise staff awareness.

Composition of the methodology

Article 1

What is information security and which documents regulate it?

More

Article 2

Who and why must comply with information security requirements in the Republic of Kazakhstan?

More

Article 3

What is a CII?

More

Article 4

What does the Information Security Department do?

More

Article 5

What is a SOC, and who needs it?

More

Article 6

What are compliance tests for information security requirements, who conducts them, and who needs to pass them?

More

Article 7

What is an audit of information systems, who conducts it, and who needs to pass it?

More

Article 8

What is an instrumental examination of information system components?

More

Article 9

What is the trusted software registry?

More

Article 10

What is the assurance level or compliance with ST RK ISO/IEC 15408-3?

More

Article 11

Useful links and resources.

More

Article 12

Feedback

More