4.3 - Determining the scope of the information security management system