5
ISO 27001 – Information Security Management - in Layman’s terms Refer to the ISO 27001 document published in year 2013 – BS ISO / IES 27001:2013 Don’t bother with anything before “page 1” (at the bottom of the page) – it’s just “warming up”. “Info Sec” = Information Security Ref Heading Meaning 1.1 General Ignore 1.2 Application Ignore 2 Normative references Ignore 3 Terms and definitions Ignore 4.1 Understanding the organisation List the internal and external Info Sec issues 4.2 Needs and expectations of interested parties Lists needs and expectations of interested parties 4.3 Scope of Info Sec List what’s “in” and what’s “out” 4.4 Info Sec management Need to have a working system 5.1 Leadership The bosses need to take this seriously -time and effort 5.2 Info Sec Policy “Grandstand statement” on Info Sec Must contain certain phrases (listed in the standard) 5.3 Organisation, Roles and Responsibilities We need list of “Who does what around here?” 6.1.1 Risks and Opportunities - General List the risks and opportunities linked to interested parties (from above) 6.1.2 Info Sec Risk Assessment Risk Assessment on Info Sec 6.1.3 Info Sec Risk Treatment What we do to “control” the risks identified above. Needs to include controls for Annex A 6.2 Objectives Info Sec objectives need to be set Objectives need to be measurable 7.1 Provision of resources We need sufficient manpower, machinery, materials and money to do the job Standards Plus Limited Laurel House, 95 Hob Hey Lane Culcheth, Warrington WA3 4NS t 01925 765 050 e [email protected] w standardsplus.co.uk

ISO 27001 in Easy Terms

  • Upload
    mythee

  • View
    215

  • Download
    0

Embed Size (px)

DESCRIPTION

ISO

Citation preview

Page 1: ISO 27001 in Easy Terms

ISO 27001 – Information Security Management - in Layman’s terms

Refer to the ISO 27001 document published in year 2013 – BS ISO / IES 27001:2013

Don’t bother with anything before “page 1” (at the bottom of the page) – it’s just “warming up”.

“Info Sec” = Information Security

Ref Heading Meaning

1.1 General Ignore

1.2 Application Ignore

2 Normative references Ignore

3 Terms and definitions Ignore

4.1 Understanding the organisation List the internal and external Info Sec issues

4.2 Needs and expectations of interested parties

Lists needs and expectations of interested parties

4.3 Scope of Info Sec List what’s “in” and what’s “out”

4.4 Info Sec management Need to have a working system

5.1 Leadership The bosses need to take this seriously -time and effort

5.2 Info Sec Policy “Grandstand statement” on Info Sec

Must contain certain phrases (listed in the standard)

5.3 Organisation, Roles and Responsibilities

We need list of “Who does what around here?”

6.1.1 Risks and Opportunities - General List the risks and opportunities linked to interested parties (from above)

6.1.2 Info Sec Risk Assessment Risk Assessment on Info Sec

6.1.3 Info Sec Risk Treatment What we do to “control” the risks identified above.

Needs to include controls for Annex A

6.2 Objectives Info Sec objectives need to be set

Objectives need to be measurable

7.1 Provision of resources We need sufficient manpower, machinery, materials and money to do the job

Standards Plus Limited Laurel House, 95 Hob Hey Lane Culcheth, Warrington WA3 4NS t 01925 765 050 e [email protected] w standardsplus.co.uk

Page 2: ISO 27001 in Easy Terms

Ref Heading Meaning

7.2 Training, awareness and competence

We need a training plan.

Every individual needs their own personal training record

7.3 Awareness Staff and contractors need to be aware of Info Sec

7.4 Communication List the internal and external communications

7.5.1 Documents - general Info Sec has to be written down

7.5.2 Creating and updating documents Document ID

Document approval

7.5.3 Document Control Documents need to be “safe” – protected, stored, version controlled etc

8.1 Operational Control Need documented procedures

8.2 Info Sec Risk Treatment Need documented controls

9.1 Measuring and monitoring performance

Need a procedure for measuring performance

9.2 Internal Audit Written procedure required.

Timetable (schedule) required.

Trained people required.

Records of audits required.

9.3 Management Review - General Minutes are required from the “Director’s Meeting

Have an agenda for the Director’s Meeting

The minutes need to say who will do what and by when

10.1 Non conformances (Info Sec incident)

Non-con – also known as “mistake” or “WTF?”

Written procedure required.

Records of mistakes are required.

What we did to fix a problem.

Written procedure required

Records of “How we fixed a problem” are required.

10.2 Continual improvement We need to get better (all areas).

Annex A

Page 3: ISO 27001 in Easy Terms

Ref Heading Meaning

A.5 Info Sec Policy Repeat of 5.2 above.

Policy needs to be reviewed

A.6.1 Internal Organisation Repeat of 5.3 above, with more details

.6.2 Mobile devices Need a policy for all remote access devices

A.7.1 Prior to employment Need pre-employment screening

Need contracts of employment

A.7.2 During employment Need Info Sec awareness

Need Info Sec as a disciplinary offence

A.7.3 Changes to employment Info Sec does not finish when you leave!

A.8.1 Info Sec Assets Need a “List of Assets”

Need an Acceptable Use policy

A.8.2 Info Classification Need to classify information

Need to label it as well.

A.8.3 Media Handling Need procedures for handling and disposal of hardware

A.9.1 Access control - networks Need a policy on (network) access

A.9.2 User management Need a procedure for registering / deregistering users.

Passwords, usernames and permissions.

Need to review privileges

A.9.3 User responsibilities Secret authentication (your mother’s dog’s favourite colour)

A.9.4 Access control - systems Logging on, passwords, changing passwords

A.10.1 Encryption Use of encryption and encryption keys

A.11.1 Physical security Perimeter, building access, secure rooms, delivery areas

A.11.2 Equipment Location, services, cabling, maintenance, unattended equipment

“Clear desk policy”

A.12.1 Operations Procedures need to be documented

Change management

Capacity management

A.12.1 Malware Anti virus

Page 4: ISO 27001 in Easy Terms

Ref Heading Meaning

A.12.3 Back up Do backups and test them

A.12.4 Event logging Protecting user event logs (from alterations)

Protecting administrators event logs (from alteration)

Clock synchronisation

A.12.5 Operating software Procedure for installing software

A.12.6 Technical vulnerability Procedures for software updates

A.12.7 Audit considerations Don’t interfere with operations

A.13.1 Network security Service level agreements

Segregation of networks

A.13.2 Information transfer Formal agreements on support calls, formal reports

Non disclosure agreements

Applies to all external organisations

A.14.1 Public networks Info Sec when using the public networks

A.14.2 Development and support Applies to software development

Applies to support services

Changes need to be controlled, reviewed, tested and accepted

A.14.3 Test data Keep it safe

A.15.1 Suppliers Non disclosure agreements and Service Level Agreements need to include Info Sec

A.15.2 Managing suppliers Monitor supplier’s performance

Changes to services need to be managed

A.16.1 Info Sec incidents Same as 10.1 above

A.17.1 Business Continuity Need a business continuity plan / disaster recovery plan

It needs to be tested (parts of it)

A.17.2 Redundancies Need spare capacity

Page 5: ISO 27001 in Easy Terms

Ref Heading Meaning

A.18.1 Legal compliance Need a procedure for keeping up to date with legislation

Need to be award of our contractual obligations with customers

Need to be aware of intellectual property / licensing obligations

A.18.2 Info Sec reviews Need to review Info Sec from time to time

Don’t bother with anything after “page 22” (at the bottom of the page) – it’s just “cooling down”.