This section of this book will highlight how the various Microsoft technologies discussed previously can be deployed to implement controls selected as part of an ISMS based on the ISO27001 information security standard.
As discussed earlier in this book, the ISO27001 information security standard does not focus solely on technology and therefore there are a number of controls that will not use Microsoft technology solutions. However, where possible we will try to identify how the Microsoft solutions can support the implementation or ongoing management of such controls.
The following are extracts from the ISO27001 standard.
Table 4. 4.1 General ...