ISO 27017
Some Clients that Has Used this Service

































































































Share This Service:
ISO 27017
Overview
The Code of practice for information security controls based on ISO/IEC 27002 for cloud Services (ISO 27017) provides guidance on the information security aspects of cloud computing, stipulating practices to be adopted by both cloud service customers and cloud service providers.
It provides recommendations of 37 cloud-specific information security controls supplementing the 114 controls detailed in ISO/IEC 27002 and an additional 7 cloud controls that address the following:
- Who is responsible for what between the cloud service provider and the cloud customer?
- The removal/return of assets when a contract is terminated
- Protection and separation of the customer’s virtual environment
- Virtual machine configuration
- Administrative operations and procedures associated with the cloud environment
- Cloud customer monitoring of activity within the cloud
- Virtual and cloud network environment alignment
DJL’s approach is fully aligned to the Plan-Do-Check-Act (PDCA) Cyclic Model for ISO standards which is a management system approach to developing, implementing, and improving the effectiveness of the management system.
The four steps of the PDCA
- Step 1 – Plan: Establish the objectives and processes necessary to deliver results in accordance with our client’s specifications.
- Step 2 – Do: Provide support and guidance for the implementation of the requisite information security processes.
- Step 3 – Check: Monitor and evaluate the processes and results against objectives and specifications and report the outcome.
- Step 4 – Act: Apply actions for required improvement. Review all steps (Plan-Do-Check-Act) and modify to improve the management system.
Completing this course will help you:
- Lorem ipsum dolor sit amet, consetur adicing off elit
- Cras sed dignissim purus us mauris varius neque
- nulla suscipit. In commodo urna eu turpis accumsan
- Nullam eget quam lectus. morbi sed nulla accuan non
Who is the course for?
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Praesent eu orci faucibus orci malesuada semper eget non tellus. Cras sed dignissim purus. Mauris varius neque leo, eu pellentesque justo venenatis et. Sed ultricies risus non turpis tempus, nec consectetur nulla suscipit.
VIDEO TESTIMONIAL
What Our Clients are saying
“I was looking for a Social Media Course to expand my career horizon. A friend of mine suggested to learn from Steve’s online courses and it really worked for me.”
“A fantastic and very engaging course. All of the information offered by Steve was completely practical, relevant and presented in an easy, digestible and interesting way.”
“This course was a breakthrough in my knowledge of digital marketing. The content is comprehensive and of great quality, engaging and interactive.”
Are You Ready To Start?
Related Services
You might also be interested in these Services
SECURE
VULNERABILITY ASSESSMENT AND PENETRATION TESTING SERVICES (VAPT)
Whatever your reasons for seeking to conduct Risk or Vulnerability Assessment, a Stress or Penetration Test: regulatory, compliance, internal policy, etc., we would be pleased to avail you of our quality services in the execution of these tests as we leverage on our experience conducting technical security assessments for organisations in diverse industries
VULNERABILITY ASSESSMENT AND PENETRATION TESTING SERVICES (VAPT)
PROJECT DURATION: APPROX. 7 WORKING DAYS
View Service
SECURE
NETWORK SECURITY SERVICES
Our network security services focus on the network layer of our clients’ information system. We review and test the network and security control architecture. The assessment is conducted using global best practice standards/methodologies – methodologies based on successful combination of technical experience, professional security analysis tools, and knowledge of hacking techniques.