Posts

Showing posts from December, 2017

CMMI Certification - Productive and Appraisal Solution for Business Development

With the ever increasing competition in the field of technological advancement, software development industries are looking for solutions to improve their quality of work to build up higher confidence and a sense of belief among their clients. This scenario has led to the establishment and evolution of various certifications that classify the firms as a symbol of trust and excellence. CMMI Certification has been recognized as a relevant and extremely important benchmark for the software development industries in order to gain a competitive edge over the opponents and stand out in the market front. CMMI stands for Capability Maturity Model Integration. It is a certification program that provides a process improvement model which an organization can apply by following best practices. In other words, the model provides guidelines for improving practices and processes applied to a project, department, or an entire organization. Streamlining the business operations is important for th

Structure of ISO 27001:2013

Controls (Annex A) A.5: Information Security Policies – Controlling how policies are written and revised A.6: Information Security Organization – Controls on how responsibilities are assigned; also includes controls for mobile devices A.7: Human Resources Security – Pre-employment, during and after employment controls A.8: Asset management – Asset inventory and acceptable use controls; also for information classification and media management A.9: Access control – Access control policy, user access management, system and application access control A.10: Cryptography – Encryption and Key Management Controls A.11: Physical and environmental security – Controls defining secure areas, entry controls, protection against threats, security of the equipment, secure removal, clear desk and clear screen policy, etc. A.12: Operational securit y – Procedures and responsibilities, malware, backup, logging, monitoring, installation, vulnerability etc. A.13: Communications S