Abstract:
The application of Integrated Management Systems (IMS) is now attracting the attention of senior management of a variety of organizations: refineries, instrument-making enterprises, aviation enterprises, defense organizations, etc. However, performing ISM audits as a verification of conformance to different ISO standards with a substantial reduction or limitation of available resources remains a major problem.
At the same time, continuous improvement of management principles and, in particular, transition to risk-based thinking provide a greater interest in the rational use of ISO standards. In this article we suggest a technique of optimization of IMS audit program based on principles of continuous adaptation when collecting data during a single audit micro-cycle. An additional advantage of the proposed technique is the use of numerical metrics of IT-security audit, contributing to continuous improvement of the level of IT security in organizations.
\Bibitem{Liv16}
\by I.~I.~Livshitz
\paper A Method for Optimizing the Integrated Management System Audit Program
\jour Tr. SPIIRAN
\yr 2016
\vol 48
\pages 52--68
\mathnet{http://mi.mathnet.ru/trspy903}
\crossref{https://doi.org/10.15622/sp.48.3}
\elib{https://elibrary.ru/item.asp?id=27177924}
Linking options:
https://www.mathnet.ru/eng/trspy903
https://www.mathnet.ru/eng/trspy/v48/p52
This publication is cited in the following 3 articles:
Hao Wu, Chia-Huei Wu, “Image Self-Coding Algorithm Based on IoT Perception Layer”, Mobile Information Systems, 2022 (2022), 1
I I Livshitz, A V Neklyudov, P A Lontsikh, “Evaluation of IT security – genesis and its state-of-art”, J. Phys.: Conf. Ser., 1015 (2018), 042029
I I Livshitz, A V Neklyudov, P A Lontsikh, “IT security evaluation - “hybrid” approach and risk of its implementation”, J. Phys.: Conf. Ser., 1015 (2018), 042030