{"id":7695,"date":"2020-02-21T12:36:22","date_gmt":"2020-02-21T09:36:22","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=7695"},"modified":"2022-08-16T14:57:43","modified_gmt":"2022-08-16T11:57:43","slug":"iso-27001-certification","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/iso-27001-certification\/7695\/","title":{"rendered":"ISO 27001 Sertifikas\u0131 Nedir ve Bizim Buna Neden \u0130htiyac\u0131m\u0131z var?"},"content":{"rendered":"<p>Yak\u0131n zaman \u00f6nce T\u00dcV AUSTRIA, Kaspersky Security Network (KSN) altyap\u0131s\u0131n\u0131 ISO\/IEC 27001:2013 standard\u0131yla k\u00f6t\u00fc ama\u00e7l\u0131 ve \u015f\u00fcpheli yaz\u0131l\u0131mlar\u0131n da\u011f\u0131t\u0131m\u0131 a\u00e7\u0131s\u0131ndan uyumlu tutumak i\u00e7in uygulad\u0131\u011f\u0131m\u0131z bilgi g\u00fcvenli\u011fi y\u00f6netimi sistemini do\u011frulad\u0131. T\u00dcV ayn\u0131 zamanda Kaspersky Lab Distributed File System (KLDFS) i\u00e7erisinde bu dosyalar\u0131n g\u00fcvenli bi\u00e7imde depolanaca\u011f\u0131n\u0131 ve g\u00fcvenle eri\u015filebilece\u011fini de onaylad\u0131.<br>\nISO\/IEC 27001:2013 sertifikas\u0131n\u0131n neyle ilgili oldu\u011funa bakal\u0131m.<\/p>\n<h2>ISO 27001 nedir?<\/h2>\n<p>ISO 27001, bilgi g\u00fcvenli\u011fi y\u00f6netimi sistemlerinin yarat\u0131m\u0131, bak\u0131m\u0131 ve geli\u015ftirilmesine y\u00f6nelik gerekliliklere sahip uluslararas\u0131 bir standartt\u0131r. \u00d6z\u00fcnde, bilgileri korumak ve m\u00fc\u015fterileri verilerinin korunmas\u0131n\u0131 g\u00fcvence alt\u0131na almak i\u00e7in g\u00fcvenlik y\u00f6netimi \u00f6nlemlerinin en iyi \u00f6rneklerinin bir araya toplanm\u0131\u015f halidir.<\/p>\n<p>Sertifikay\u0131 vermek i\u00e7in ba\u011f\u0131ms\u0131z bir olu\u015fum (bizim \u00f6rne\u011fimizde T\u00dcV AUSTRIA), temel ama\u00e7lar\u0131 siber g\u00fcvenlik sa\u011flayan i\u015flemlerin en iyi \u00f6rneklerle uyumlu olup olmad\u0131\u011f\u0131n\u0131 kontrol etmek olan denetimciler g\u00f6nderir. Denetim s\u0131ras\u0131nda \u0130K, BT, Ar-Ge ve G\u00fcvenlik de dahil olmak \u00fczere \u00e7e\u015fitli departmanlardaki s\u00fcreci inceleyip kapsaml\u0131 bir rapor haz\u0131rlarlar. Ard\u0131ndan, ba\u011f\u0131ms\u0131z uzmanlar, denet\u00e7ilerin tarafs\u0131zl\u0131\u011f\u0131n\u0131 analiz eder. Son olarak, ba\u011f\u0131ms\u0131z kurulu\u015f bir sertifika verir. Bize verilen sertifika, bilgi g\u00fcvenli\u011fi y\u00f6netimi sistemimizin en iyi \u00f6rneklerle uyumlu oldu\u011funu do\u011frulamaktad\u0131r.<\/p>\n<h2>Sertifikal\u0131 olmak ne anlama gelir?<\/h2>\n<p>M\u00fc\u015fterilerimiz \u00f6ncelikle, k\u00f6t\u00fc ama\u00e7l\u0131 ve \u015f\u00fcpheli nesneler i\u00e7in otomatik ve uzmanlar\u0131m\u0131z taraf\u0131ndan manuel olarak m\u00fcmk\u00fcn olan en iyi g\u00fcvenlik seviyesini sa\u011flay\u0131p sa\u011flamad\u0131\u011f\u0131m\u0131zla ilgileniyor. Her antivir\u00fcs \u015firketi i\u00e7in her \u015feyin merkezinde bu konu var. Bu sebeple, Kaspersky Security Network altyap\u0131s\u0131n\u0131 ve g\u00fcvenli depolama alan\u0131 olan Kaspersky Lab Distributed File System\u2019\u0131 kullanarak k\u00f6t\u00fc ama\u00e7l\u0131 ve \u015f\u00fcpheli dosyalar\u0131n sevkiyat\u0131 ile ilgili sertifikay\u0131 almak istedik. Ancak denet\u00e7iler yaln\u0131zca bu alan\u0131 incelemiyorlard\u0131. \u015eirketteki pek \u00e7ok hizmet, benzer \u015fekilde d\u00fczenlenmi\u015fti.<\/p>\n<p>Herhangi bir i\u015flemin g\u00fcvenli\u011fini bir\u00e7ok fakt\u00f6r ayn\u0131 anda etkiler; bilgi g\u00fcvenli\u011fi y\u00f6netimi sistemleri ise bu fakt\u00f6rleri belirlemeye ve zaman\u0131nda \u00f6nlem almaya yard\u0131mc\u0131 olabilir. Siber g\u00fcvenlik alan\u0131nda pek \u00e7ok soru kritik \u00f6nemde kabul edilebilir. Bilgi sistemlerine ve kritik bilgilere kimlerin eri\u015fimi var? \u0130\u015f s\u00fcre\u00e7leri nas\u0131l ilerliyor? \u00c7al\u0131\u015fanlar, belgelerle ve bilgi sistemleriyle ne \u015fekilde i\u015f yap\u0131yorlar? Bir \u00e7al\u0131\u015fan i\u015ften \u00e7\u0131kt\u0131\u011f\u0131nda g\u00fcvenlik ekibi eri\u015fim haklar\u0131n\u0131 geri \u00e7ekme konusunu nas\u0131l ele al\u0131yor? \u00c7al\u0131\u015fanlar olas\u0131 siber tehditler ve bunlara kar\u015f\u0131 korunman\u0131n yollar\u0131 konusunda ne kadar bilin\u00e7li? Y\u00f6neticiler, kritik operasyonlar y\u00fcr\u00fcten bilgisayarlarla nas\u0131l \u00e7al\u0131\u015f\u0131yor?<\/p>\n<p>Koruma sistemi ayn\u0131 zamanda yeni tehdit t\u00fcrlerini ve bunlara kar\u015f\u0131 al\u0131nacak aksiyonlar\u0131 da de\u011ferlendiriyor. \u00d6rne\u011fin, makine \u00f6\u011frenimi algoritmalar\u0131 dahil yeni teknolojilerin kullan\u0131m\u0131n\u0131n olas\u0131 risklerine kar\u015f\u0131 at\u0131lacak ad\u0131mlar, ATP sald\u0131r\u0131lar\u0131na kar\u015f\u0131 koruma, vb.<br>\nDenet\u00e7iler yukar\u0131dakileri de g\u00f6z \u00f6n\u00fcnde bulundurarak \u00e7e\u015fitli departmanlardan \u00e7al\u0131\u015fanlarla konu\u015ftu ve veri korumas\u0131n\u0131n teknik ve i\u015fe al\u0131m, i\u015ften \u00e7\u0131karma ve e\u011fitim gibi organizasyonel taraflar\u0131n\u0131 analiz etti. BT servisinin kurumsal a\u011fa nas\u0131l bak\u0131m uygulad\u0131\u011f\u0131n\u0131 incelediler ve veri merkezlerimizi ziyaret ettiler.<\/p>\n<p>T\u00fcm bunlara ek olarak \u00e7al\u0131\u015fanlar\u0131n i\u015flerini nas\u0131l yapt\u0131\u011f\u0131n\u0131 da g\u00f6zlemlediler; bas\u0131l\u0131 belgeleri veya \u00e7\u0131kar\u0131labilir cihazlar\u0131 ofiste ortada b\u0131rak\u0131p b\u0131rakmad\u0131klar\u0131n\u0131, masalar\u0131ndan uzakla\u015f\u0131rken bilgisayarlar\u0131n\u0131 kilitleyip kilitlemediklerini, monit\u00f6rlerinin ve kontrol panellerinin neyi g\u00f6r\u00fcnt\u00fcledi\u011fini ve \u00e7al\u0131\u015f\u0131rken ne t\u00fcr programlar kulland\u0131klar\u0131n\u0131 kontrol ettiler. Di\u011fer bir deyi\u015fle, bilgi g\u00fcvenli\u011fi y\u00f6netimi sistemi s\u00fcre\u00e7lerini do\u011frulamaya \u00f6zel olarak dikkat ederken, t\u00fcm \u015firketi ilgilendiren \u015fu pratikleri de analiz ettiler: Y\u00f6netimin g\u00fcvenlik analizi, risk y\u00f6netimi, vaka y\u00f6netimi, d\u00fczeltmeye y\u00f6nelik eylemler, denetimler, \u00e7al\u0131\u015fanlar\u0131n siber g\u00fcvenlik bilincine sahip olmalar\u0131n\u0131 sa\u011flama ve i\u015f devaml\u0131l\u0131\u011f\u0131n\u0131 s\u00fcrd\u00fcrme.<\/p>\n<h2>S\u0131rada ne var?<\/h2>\n<p>Art\u0131k endi\u015feli m\u00fc\u015fteriler, ba\u011f\u0131ms\u0131z uzmanlar\u0131n g\u00f6r\u00fc\u015flerini temsil eden sertifikay\u0131 inceleyebilir. \u00c7\u00f6z\u00fcmlerimizin \u00e7o\u011funda sertifikal\u0131 hizmetler yer ald\u0131\u011f\u0131 i\u00e7in, \u00f6zellikle kurumsal bir \u015firket bir g\u00fcvenlik sa\u011flay\u0131c\u0131s\u0131 se\u00e7erken ISO 27001 sertifikas\u0131yla ilgili sorular s\u0131k s\u0131k g\u00fcndeme geliyor.<\/p>\n<p>Fakat s\u00fcre\u00e7 bununla da s\u0131n\u0131rl\u0131 de\u011fil. Her \u00fc\u00e7 y\u0131lda bir sertifikam\u0131z\u0131 yeniliyoruz. Bu da sertifika i\u00e7in daha fazla denetim anlam\u0131na geliyor. Ayr\u0131ca denet\u00e7iler her y\u0131l yerinde incelemede de bulunuyorlar.<\/p>\n<p>Sertifika hakk\u0131nda ayr\u0131nt\u0131l\u0131 bilgiyi <a href=\"https:\/\/www.kaspersky.com\/about\/iso-27001\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/www.kaspersky.com\/about\/iso-27001<\/a> adresinde bulabilirsiniz.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sertifika verilen \u015fey tam olarak nedir ve sertifika nas\u0131l veriliyor <\/p>\n","protected":false},"author":2706,"featured_media":10935,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1615,2118,1407],"class_list":{"0":"post-7695","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-gti","10":"tag-iso-27001","11":"tag-seffaflik"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/iso-27001-certification\/7695\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/iso-27001-certification\/18541\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/iso-27001-certification\/15415\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/iso-27001-certification\/7797\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/iso-27001-certification\/20326\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/iso-27001-certification\/18629\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/iso-27001-certification\/17160\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/iso-27001-certification\/21146\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/iso-27001-certification\/19983\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/iso-27001-certification\/26358\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/iso-27001-certification\/32525\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/iso-27001-certification\/13768\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/iso-27001-certification\/14462\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/iso-27001-certification\/12823\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/iso-27001-certification\/22297\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/iso-27001-certification\/27768\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/iso-27001-certification\/25024\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/iso-27001-certification\/20980\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/iso-27001-certification\/25819\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/iso-27001-certification\/25651\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/seffaflik\/","name":"\u015feffafl\u0131k"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=7695"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7695\/revisions"}],"predecessor-version":[{"id":7699,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7695\/revisions\/7699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10935"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=7695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=7695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=7695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}