ISO 27001/2 Compliance
Information access and user security

This report explores the requirements of ISO 27001/2 with regards to information access and user security.

Based on research with 1500 workers in the US and UK it highlights areas where organizations could be doing better and provides a compliance checklist to help with access control (Section A9) and operations security (Section A12).

Report ISO 27001/2 Compliance

Download the report to learn:

  • The requirements of IS0 27001/2 for user security and information access
  • What organizations are doing with employees to safeguard sensitive information
  • What organizations are doing to control and secure network access
  • What organizations are doing with regards to monitoring network and file access

Discover The Report Now:

PDF Version - 600 KB