Online Store for ISO Certification,

ISO Audits, ISO Training

recommended_merchant_badge.png

Software Security Checklist | Secure SDLC AUDIT CHECKLIST - 318 Questions

SKU ISMS - 19
$167
In stock
1
Product Details


Audit Checklist questionnaires to determine the non-compliance of Software Security in conformity with ISO 27001, and to measure the effectiveness of information Security, contains downloadable Excel file with 03 sheets having:-

  • 318 Checklist questions covering the requirements of Security in Software Development.
  • Complete Inventory of Clauses, clause numbers, and Clause titles of ISO 27001:2013
  • The complete inventory of Controls, control numbers, control objectives, and Domains of ISO 27001:2013.

File format - Excel compatible for both Mac and Windows

Contains – As described in the description mentioned above

Content Contribution - ISMS Committee of Industry Experts, Principal Instructors, and Lead Auditors of ISO 27001

Content Approved By- ISO Training Institute

Language - English

File Delivery method - Immediate and Automatic. Through the secure link in the email provided at the time of check-out

Link Validity - 72 hours from the time of receiving the link through email

Original Price - $ 234 discounted 40% for a limited period

Special Price - USD 167

Invoice - Invoice is generated on your device immediately after successful payment.

This checklist is useful for-

  • Organization Planning for ISO 27001 Certification.
  • Compliance Audits
  • Gap Assessments
  • Enhancing longevity of the business.
  • Organizations keen for robust, resilient, and value-added Information Security Management System in Software Development.
  • Organizations keen to protect themselves against issues from SDLC Security requirement of ISMS.
  • Organizations who want to survive client audits.
  • Information Security Professionals.
  • Internal auditors of Information Security Management System
  • External Auditors of Information Security Management System
  • Auditors of the client organizations who are tasked to assess the ISMS capability of their Service Providers, Vendors, and contractors.
  • Students of Information Security Management System

This Checklist is prepared by IRCA Principal Auditors & Lead Instructors of Information Security Management System under the aegis of ISO training Institute.

Note-

Securely save the original checklist file, and use the copy of the file as your working document during preparation/conduct of the Audit of Security in Software Development.

The organization's Software Development processes are at varying levels of ISMS maturity, therefore, use checklist quantum apportioned to the current status of threats emerging from risk exposure.

The Software Security Checklist follows the cardinals of Risk-based thinking (RBT), Process approach, and PDCA (Plan Do Check Act) methodology.

Save this product for later