The security of your space and information is a top priority at Kisi. Check our Security page to learn more about how we’re keeping you and your data safe.
The ISO 27001 standard is a globally recognized information security standard developed and maintained by the International Organization for Standardization (ISO) and provides the specification for an information security management system or ISMS.
Organizations using an ISMS, especially one that conforms to ISO 27001, can ensure compliance with a host of laws, including the high-profile GDPR general data protection regulation and the network and information systems regulations, or MIS regulations.
The ISO 27001 standard is the centerpiece of the ISO 27000 series, a set of multiple information security standards that together form a widely recognized framework for managing information security best practices. These standards provide a framework of specifications, codes of conduct, and best practices for securing information assets.
In order to achieve this certification, Kisi's compliance was validated by an independent auditor.
Some of the benefits of being ISO 27001 certified are:
Secure information: ISO 27001 helps protect all forms of information whether digital, paper-based or stored in the cloud.
Increase cyber attacks resilience: Detect and reduce cyber threats early. Kisi is conducting penetration tests at least once per year, as part of ISO 27001.
Protect the confidentiality, integrity and availability of the data: ISO 27001 helps to ensure that the information is:
Confidential: Not available or disclosed to unauthorized people entities or processes.
Whole: Complete and accurate, and protected from corruption.
Available: Accessible and usable as and when authorized users require it.
- Comply with business, legal, contractual and regulatory requirements: ISO 27001 certification is also in line with rigid regulatory requirements such as the GDPR (General Data Protection Regulation), the NIS Directive (Directive on security of network and information systems) and other cybersecurity laws.
For more information, please check our guide on ISO 27001 Compliance.