Table 15.
Comparison of security among Korea cloud service certification system, ISO 27001, ISMS, and PIMS.
| Division | Controlled item | Information protection management system | ||
|---|---|---|---|---|
| ISO 27001 | ISMS | PIMS | ||
| Korea cloud service certification system | Availability | — | — | — |
| Expandability | — | — | — | |
| Performance | — | — | — | |
| Data management | (i) Asset management (ii) Communication and operation management |
(i) Information asset classification (ii) Operation management |
(i) Personal information classification (ii) Technical protective measure |
|
| Security | (i) All items | (i) All items | (i) All items excluding requirement based on lifecycle | |
| Service continuity | (i) System transfer (ii) Development and repair/maintenance |
(i) System development security | — | |
| Service support | (i) Communication and operation management | (i) Operation management | (i) Technical protective measure | |