Methodology
EN
All methodology articles
Contents
  • 1What is information security and which documents regulate it?
  • 2Who and why must comply with information security requirements in the Republic of Kazakhstan?
  • 3What is a CII?
  • 4What does the Information Security Department do?
  • 5What is a SOC, and who needs it?
  • 6What are compliance tests for information security requirements, who conducts them, and who needs to pass them?
  • 7What is an audit of information systems, who conducts it, and who needs to pass it?
  • 8What is an instrumental examination of information system components?
  • 9What is the trusted software registry?
  • 10What is the assurance level or compliance with ST RK ISO/IEC 15408-3?
  • 11Independent pentest
  • 12Why the Trusted Software Registry
  • 13How to classify an information object
  • 14Useful links and resources.
  • 15Feedback
Reading progress0%
placeholder

To access the Methodology article, you need to

или
HomeFeedAll CoursesMethodology
  • Home
  • About Company
  • Methodology
  • News
  • Payments. Online payment by bank card
  • Offer agreement
  • Privacy Policy
  • Terms of Service
  • Q&A
  • Noticed an incident?

    Phishing, fraud, data leak, or suspicious activity — describe the situation, and we’ll help you sort it out.

  • Want to leave feedback?

    Share your impressions about the platform or course — it helps us improve.

Powered By MSSP.GLOBAL

Copyright © 2025 CitizenSec. All Rights Reserved.