This report displays existing
web application vulnerabilities
that violate this standard control objectives. The control objectives
as listed in this standard are directly derived from and aligned with
the control objectives listed in ISO 17799.
Why it matters
ISO
27002 establishes guidelines
and general principles for initiating, implementing, maintaining,
and improving information security management in an organization.
Information security is achieved by implementing a suitable set of
controls, such as: policies, processes, procedures, organizational
structures and software and hardware functions. These controls need
to be established, implemented, monitored, reviewed, improved and
reported on to ensure that the specific security and business objectives
of the organization are met.