External Audit ISO 27001

General Certificates for companies are issued by organisations called certification bodies, which are entities licensed by accreditation bodies to perform certification audits and assess if a company’s Information Security Management System is compliant with ISO IEC 27001. Compleye is not a certification body (Let’s call them Audit Companies) – we support Lees meer…

Threat Intelligence

This Wiki Page can be used as a Cheat Sheet during security meetings. Or Create your own Template Checklist in Compleye Online. The Threat Analysis Checklist: Define Threat Name your threat Source of Threat How did you get aware of it? Where is it coming from? Impact/Challenge Describe high-level the Lees meer…

Closed Improvements

Why? High Level ISMS requirements​ Closed improvements are part of the process for creating the Management review report. How? Compleye Tips​ In this section you can see a list of all the improvements that are closed. Besides the information on where the closed improvement is coming from, date when it Lees meer…

Checklists

Why? High Level ISMS requirements​ Your ISMS needs continuous improvement and maintenance. This is where, having checklists as part of your operational procedures is a very good idea. Creating checklists is an efficient and a lean way of keeping track of the activities and steps when following the procedures.  How? Lees meer…

Templates

Compleye provides templates for multiple frameworks. In the table below you can find a list of templates – with a reference to frameworks. Templates will be reviewed on a yearly base by Compleye – if needed more often, we will keep you informed about the updates. How to use: Download Lees meer…