ISO 27001 – Management of technical vulnerabilities

The newly published ISO 27001:2022 in October 2022 brings a restructured catalogue of measures. Among other things, the new measure A.8.8 – Management of technical vulnerabilities – was introduced. This requires the operator of an ISMS to obtain information about technical vulnerabilities of the information systems used, to assess the exposure of the organisation to such vulnerabilities and to take appropriate measures.

Here, too, automation is the key to success. Implementing such measures manually is not only time-consuming, but also enormously expensive and risky – after all, day-to-day business too often takes precedence and there is simply no time for careful implementation. There is an acute danger of overlooking important matters and exposing information and systems to considerable risk.

Early warning system Watchdog by TEN IM

The good news: with Watchdog by TEN IM, these and numerous other measures can be carried out in a highly elegant, cost-efficient and time-saving automated way. Watchdog by TEN IM is your early warning system for your IT environment – whether traditionally on premise or in the cloud – and continuously analyses the threat situation based on the logs of your monitored systems. Recommendations for measures to be implemented are delivered “free of charge”. And the experts from TEN Information Management are available as sparring partners when it comes to deriving concrete actions from the findings.

Would you also like to know how you can implement measures of your ISO 27001 ISMS in an automated, cost-efficient and time-saving way with Watchdog by TEN IM? We would be happy to show you the solution in a free demo.


Share post

More articles

Risk precautions are supposedly just as unwelcome as health precautions. But they are just as important! Various studies prove: Attacks on IT systems and applications are increasing significantly. The consequences are financially devastating. At the...
One of the core competences of cloud service providers is the safeguarding of infrastructures with regard to IT security. But what should be taken into account when using the cloud? The cloud has many advantages:...
In a data center of the cloud provider OVH in Strasbourg, millions of customer data were finally destroyed in February 2021. Apparently, the fire protection measures were not sufficient. What about your information security measures?...