Preserves the confidentiality, integrity and availability of information by applying a risk management process.
To decrease the risks to business operations.
Core topic areas that Covered Most Aspects of Information Security
Objectives of Control
Applicable Controls to be Implemented on ISMS Program