Cover image of show Framework - ISO 27001 (Cyber)

Framework - ISO 27001 (Cyber)

Podcast by Jason Edwards

English

Technology & science

Limited Offer

2 months for 19 kr.

Then 99 kr. / monthCancel anytime.

  • 20 hours of audiobooks / month
  • Podcasts only on Podimo
  • All free podcasts
Get Started

About Framework - ISO 27001 (Cyber)

The ISO/IEC 27001 Framework is the internationally recognized standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It provides a systematic approach to managing sensitive information through risk management, governance, and control implementation. At its core, ISO 27001 helps organizations protect the confidentiality, integrity, and availability of data—whether stored, processed, or transmitted—by aligning security practices with business objectives and regulatory requirements. The framework is built around a risk-based process, requiring organizations to identify potential threats, assess their likelihood and impact, and implement appropriate controls from the companion standard ISO/IEC 27002. These controls cover a wide range of areas including asset management, access control, cryptography, operations security, and supplier relationships. By tailoring these controls to organizational needs, ISO 27001 supports both flexibility and accountability—ensuring that security measures are not just technical but also strategic and operational. Beyond compliance, ISO 27001 fosters a culture of continuous improvement through regular audits, performance monitoring, and leadership involvement. Certification to the standard demonstrates to customers, partners, and regulators that an organization follows internationally accepted best practices for managing information security risk. More than a checklist, ISO 27001 functions as an ongoing management framework that integrates security into every level of organizational decision-making, helping build trust, resilience, and long-term operational stability.

All episodes

71 episodes

episode Episode 70 — A.8.33–8.34 — Test information; Protecting systems during audit testing artwork

Episode 70 — A.8.33–8.34 — Test information; Protecting systems during audit testing

A.8.33 governs test information—data and artifacts used to verify functionality and security—so that confidentiality, integrity, and legality are preserved. For the exam, distinguish data sources and handling: anonymized or synthetic data preferred over raw production; masking or tokenization when realism is required; and strict retention and segregation for test artifacts like logs, screenshots, and dumps. Requirements should specify who may generate, access, and distribute test data; where it may reside; and how it is disposed at project end. The control aims to eliminate silent leakage—debug captures in shared chats, copies on laptops, or third-party test tools syncing to foreign regions—by making test data subject to the same classification and transfer rules as production. Candidates should be comfortable mapping these expectations to privacy obligations and customer contracts that constrain data use. A.8.34 focuses on protecting systems during audit and assessment testing, ensuring verification activities do not impair availability or corrupt evidence. Organizations must scope tests, define safe windows, throttle intrusive techniques, and coordinate with change and incident processes. Evidence integrity requires controlled accounts, approved tools, and isolation where feasible, with clear rollbacks and halt criteria if instability appears. Pitfalls include running scans in peak hours, testing against production without traffic shaping, or granting broad privileges to external assessors without monitoring. Effective programs provide test environments representative of production, maintain attested tool lists, and capture before/after baselines to attribute impacts accurately. Candidates should explain how these controls produce a defensible assurance posture: auditors gain the access they need, stakeholders retain service continuity, and the organization can prove that testing was authorized, controlled, and recoverable—with artifacts that tie findings to specific methods and time frames. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

14 Oct 2025 - 13 min
episode Episode 69 — A.8.31–8.32 — Separation of dev/test/prod; Change management artwork

Episode 69 — A.8.31–8.32 — Separation of dev/test/prod; Change management

A.8.31 enforces separation between development, test, and production to prevent inadvertent changes, data leakage, and unauthorized access. For the exam, stress environment isolation, distinct identities and credentials, segregated networks, and differentiated data sets—production PII or secrets must not appear in dev/test without approved masking or synthetic generation. Tooling should prevent cross-environment key reuse, block direct production access from developer workstations, and restrict pipeline promotions to approved, signed artifacts. Monitoring verifies that boundaries hold by detecting configuration drift, unexpected flows, and unauthorized console use. Candidates should emphasize that separation is not just physical: it is procedural and identity-centric, aligning to zero-trust patterns that assume compromise is possible and constrain blast radius. A.8.32 requires disciplined change management so that modifications are authorized, tested, communicated, and auditable. Practical implementations use ticketed requests with business justifications, risk/impact assessments, peer reviews, and backout plans; emergency changes follow expedited paths but still capture evidence and post-change validation. CI/CD pipelines encode checks—linting, tests, security scans, and policy gates—so approvals are enforced rather than ceremonial. Pitfalls include “temporary” hotfixes that linger, unauthorized config toggles, and release notes that omit security implications. Strong programs classify changes (standard/normal/emergency), define windows and freeze periods, and track deployment success, incident correlations, and mean time to restore after change-induced failures. Candidates should connect environment separation and change management as twin safeguards: one prevents unsafe paths, the other ensures safe, traceable movement along the intended path—together producing a production state that is defensible to auditors and reliable for customers. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

14 Oct 2025 - 11 min
episode Episode 68 — A.8.29–8.30 — Security testing in development & acceptance; Outsourced development artwork

Episode 68 — A.8.29–8.30 — Security testing in development & acceptance; Outsourced development

A.8.29 requires structured security testing throughout development and acceptance, proving that controls operate as intended before release. For the exam, differentiate testing modalities and purposes: unit and integration tests that encode security invariants; SAST for code weaknesses; DAST and IAST for runtime behavior; software composition analysis for dependencies; fuzzing and negative testing for robustness; and targeted penetration testing to validate exploitability and compensating controls. Acceptance must include verification of logging, alerting, and recovery paths—not only functional success. The control expects test plans, coverage criteria, environmental parity, and defect lifecycles with severity-driven SLAs. Candidates should note evidence expectations: reproducible results, traceability from risk to test case, and sign-off records that justify release decisions. A.8.30 addresses outsourced development, recognizing unique risks in third-party or staff-augmented engineering. Security requirements must flow down contractually: background screening, secure coding standards, toolchain controls, IP ownership, confidentiality, vulnerability disclosure, and rights to assess or audit. Access should be least-privilege, time-bound, and brokered through managed repositories and build systems; secrets must never be shared outside approved vaulting. Pitfalls include broad repository access, unmanaged contractor devices, and opaque subcontracting chains that dilute accountability. Effective programs standardize secure workspaces (VDI or managed dev environments), require signed commits and protected branches, and integrate vendor work into the same CI/CD gates and SAST/SCA policies used internally. Candidates should connect outsourced development to supply-chain assurance and incident readiness, explaining how contracts, onboarding checklists, and technical guardrails combine to make third-party contributions verifiable, revocable, and resilient against compromise. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

14 Oct 2025 - 13 min
episode Episode 67 — A.8.27–8.28 — Secure system architecture & engineering; Secure coding artwork

Episode 67 — A.8.27–8.28 — Secure system architecture & engineering; Secure coding

A.8.27 focuses on secure system architecture and engineering, requiring designs that partition trust, minimize attack surface, and enforce least privilege at every layer. For the exam, emphasize architectural tactics—segmentation, brokered access, defense-in-depth, fail secure defaults, and explicit data flow controls—tied to assets, classifications, and availability objectives. Engineers must document assumptions, dependencies, and threat models, choosing protocols and components that support verifiable security (e.g., mutual TLS, hardware-backed keys, reproducible builds). The control values repeatability: reference architectures, reviewed patterns, and component baselines reduce variance and speed secure delivery. Candidates should show how architectural decisions are validated through design reviews, simulations, and chaos or failure-injection tests that confirm resilience under fault and attack conditions. A.8.28 brings secure coding into daily practice, translating architectural intent into robust implementation. Secure coding standards define input handling, output encoding, memory safety expectations, cryptographic APIs, error handling, logging hygiene, and secret management. Tooling enforces habits: pre-commit hooks for secret scanning, static analysis tuned for false-positive control, dependency checks with severity gates, and mandatory peer reviews with checklists that include abuse cases. Pitfalls include accepting “temporary” debug endpoints, ignoring warnings for performance expedience, and broad exception handling that masks exploitation. Effective teams teach developers to reason about identity and authorization contexts, use typed and parameterized interfaces, and remove unused features to shrink reachable code. Evidence for audit includes standards repositories, training records, tool configurations, review artifacts, and remediation SLAs for code issues. Candidates should relate how architecture sets constraints, secure coding delivers within them, and both are proven by tests and telemetry—creating a chain from design principles to runtime behavior that stands up to scrutiny. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

14 Oct 2025 - 14 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Choose your subscription

Most popular

Limited Offer

Premium

20 hours of audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

2 months for 19 kr.
Then 99 kr. / month

Get Started

Premium Plus

Unlimited audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

Start 7 days free trial
Then 129 kr. / month

Start for free

Only on Podimo

Popular audiobooks

Get Started

2 months for 19 kr. Then 99 kr. / month. Cancel anytime.