Control- ISO 27001 Annex : A.14.1.3 Protecting Application Services Transactions in order to avoid incomplete transmission, misrouting, unauthorized messaging modification, unauthorized dissemination, unauthorized message replication, or replay, information concerning application service transactions should be covered.
Implementation Guidance – The following should include information security considerations for application service transactions:
- The use by each party involved in the transaction of electronic signatures;
- All transaction aspects, i.e. making sure:
- All parties’ information about the user’s secret authentication is valid and verified;
- The transaction is kept secret;
- Privacy is maintained with respect to all participating parties;
Related Product : ISO 27001 Lead Auditor Training And Certification ISMS
- The route of contact between all parties concerned is encrypted;
- The contact protocols used by all parties concerned are ensured;
- ensuring that transaction information is stored outside a publicly accessible environment e.g. on a storage platform on an organization intranet and that it is not retained and exposed on an internet-accessible storage medium;
- The protection is incorporated and implemented in the entire end-to-end certificate/signature management process when a trusted authority is used (e.g. for the purpose of issuing and retaining digital signatures or digital certificates).
Other Information – The size of the controls taken must be proportionate to the risk level of each application service transaction.
Transactions in the jurisdiction from which the transaction is produced, processed, completed, or deposited that need to comply with applicable laws and regulations.
Also Read : ISO 27001 Annex : A.14.1.2 Securing Application Services on Public Networks
A well-known ISO 27001 Lead Auditor and ISO 27001 Lead Implementer certificate that mainly covers information security clauses and their implementation, i.e., controls which should be implemented by the organization to preserve the CIA triad, Confidentiality, Integrity, and Availability to maintain their critical, sensitive information in a secure manner. Infosavvy, an institute in Mumbai conducts training and certification for multiple domains in Information Security which includes IRCA CQI ISO 27001:2013 Lead Auditor (LA), ISO 27001 Lead Implementer (LI) (TÜV SÜD Certification). Infosavvy will help you to understand and recognize the full scope of your organization’s security checks to protect your organization’s activities and information equipment (assets) from attacks, and also to illustrate the Controls for Protecting Application Service Transactions. We have trainers with extensive expertise and experience to ensure the efficient handling of the security of information. Consequently, the applicant will gain the necessary skills for the ISMS audit by using commonly agreed audit concepts, procedures and techniques.
Read More : https://info-savvy.com/iso-27001-annex-a-14-1-3-protecting-application-services-transactions/
-------------------------------------------------------------------------------------------------------------------------------------
Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092
Contact us – www.info-savvy.com