Support the customer for implemented information security management system based on ISO/IEC 27001:2005 and ISO/IEC 27001:2013.
Established an ISMS policy in terms of the information security policies.
Gathered assets related to ISMS Scope for risk assessment.
Defined risk methodology.
Defined threat and vulnerability for risk assessment.
Defined and documented for risk treatment plan.
Established ISMS Procedures.
Determining and implementing the corrective action needed from results of internal audit and CB Audit.