ISO 27001 presentacion.ppt

Embed Size (px)

Citation preview

  • 8/10/2019 ISO 27001 presentacion.ppt

    1/21

    2012ISO27kForum

    http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    2/21

  • 8/10/2019 ISO 27001 presentacion.ppt

    3/21

    2012ISO27kForum

    ISO27001 formally specifies how to establish an InformationSecurity Management System (

    ISMS

    ).

    The adoption of an ISMS is a strategic decision.

    The design and implementation of an organizations ISMS isinfluenced by its business and security objectives, its securityrisks and control requirements, theprocesses employed andthesize and structure of the organization: a simple situationrequires a simple ISMS.

    The ISMS will evolve systematically in response to changingrisks.

    Compliance with ISO27001 can be formally assessed andcertified. A certified ISMS builds confidence in theorganizations approach to information security managementamong stakeholders.

    ISO27001

    http://www.iso27001security.com/http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    4/21

    2012ISO27kForum

    ISO27002 is a Code of Practice recommending a largenumber of information security controls.

    Control objectives throughout the standard are generic,high-level statements of business requirements forsecuring or protecting information assets.

    The numerous information security controlsrecommended by the standard are meant to beimplemented in the context of an ISMS, in order toaddress risks and satisfy applicable control objectivessystematically.

    Compliance with ISO27002 implies that theorganization has adopted a comprehensive, goodpractice approach to securing information.

    ISO27002

    http://www.iso27001security.com/http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    5/21

    2012ISO27kForum

    Management should actively support informationsecurityby giving clear direction (e.g. policies),

    demonstrating the organizations commitment, plusexplicitly assigning information securityresponsibilities to suitable people.

    Management should approve the information securitypolicy, allocate resources, assign security roles andco-ordinate and review the implementation of security

    across the organization. Overt management support makes information

    security more effective throughout the organization,not least by aligning it with business and strategicobjectives.

    Management

    support is vital

    http://www.iso27001security.com/http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    6/21

    2012ISO27kForum

    Management should define the scope of the ISMS interms of the nature of the business, the organization,

    its location, informationassets andtechnologies. Any exclusions from the ISMS scope should be

    justified and documented. Areas outside the ISMS are inherently less trustworthy, hence

    additional security controls may be needed for any businessprocesses passing information across the boundary.

    De-scoping usually reduces the business benefits of the ISMS.

    If commonplace controls are deemed not applicable,this should be justified and documented in theStatement of Applicability (SOA)

    The certification auditors will check thedocumentation.

    Define ISMS

    scope

    http://www.iso27001security.com/http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    7/21

    2012ISO27kForum

    An inventoryof all important information assetsshould be developed and maintained, recording

    details such as: Type of asset;

    Format (i.e. software, physical/printed, services,people, intangibles)

    Location;

    Backup information;

    License information; Business value (e.g. what business processes

    depend on it?).

    Inventory information

    assets

    http://www.iso27001security.com/http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    8/21

    2012ISO27kForum

    Risk assessments should identify, quantify, and prioritizeinformation security risks against defined criteria for riskacceptance and objectives relevant to the organization.

    The results should guide and determine the appropriatemanagement action and priorities for managing informationsecurity risks and for implementing controls selected to protectagainst these risks.

    Assessing risks and selecting controls may need to beperformed repeatedly across different parts of the organizationand information systems, and to respond to changes.

    The process should systematically estimate the magnitude ofrisks (risk analysis) and compare risks against risk criteria todetermine their significance (risk evaluation).

    The information security risk assessment should have a clearlydefined scope and complement risk assessments in otheraspects of the business, where appropriate.

    Assess information

    security risks

    http://www.iso27001security.com/http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    9/21

  • 8/10/2019 ISO 27001 presentacion.ppt

    10/21

    2012ISO27kForum

    The organisation should formulate a risk treatmentplan (

    RTP

    ) identifying the appropriate management

    actions, resources, responsibilities and priorities fordealing with its information security risks.

    The RTP should be set within the context of theorganization's information security policy and shouldclearly identify the approach to risk and the criteria foraccepting risk.

    The RTP is the key document that links all four phasesof the PDCA cycle for the ISMS (next 2 slides).

    Prepare Risk

    Treatment Plan

    http://www.iso27001security.com/http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    11/21

  • 8/10/2019 ISO 27001 presentacion.ppt

    12/21

  • 8/10/2019 ISO 27001 presentacion.ppt

    13/21

  • 8/10/2019 ISO 27001 presentacion.ppt

    14/21

    m

  • 8/10/2019 ISO 27001 presentacion.ppt

    15/21

    2012ISO27kForum

    Management must review the organizations ISMS atleast once a year to ensure its continuing suitability,

    adequacy and effectiveness. They must assess opportunities for improvement and

    the need for changes to the ISMS, including theinformation security policy and information securityobjectives.

    The results of these reviews must be clearlydocumented and maintained (records).

    Reviews are part of the Check phase of the PDCAcycle: any corrective actions arising must be managedaccordingly.

    Corrective actions

    Compliance

    Review

    m

    http://www.iso27001security.com/http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    16/21

    2012ISO27kForum

    Prior to certification, the organization should carry outa comprehensive review of the ISMS and SOA.

    The organization will need to demonstrate compliancewith both the full PDCA cycle and clause 8 ofISO27001, the requirement for continualimprovement.

    Certification auditors will seek evidence (in the form ofrecords of processes such as risk assessments,

    management reviews, incident reports, correctiveactions etc.) that the ISMS is operating and continuallyimproving.

    The ISMS therefore needs a while to settle down,operate normally and generate the records after it hasbeen implemented.

    Pre-Certification

    Assessment

    m

    http://www.iso27001security.com/http://www.iso27001security.com/http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    17/21

    2012ISO27kForum

    Certification involves the organizations ISMSbeing assessed for compliance with ISO27001.

    The certification body needs to gain assurancethat the organizations information security riskassessment properly reflects its businessactivities for the full scope of the ISMS.

    The assessors will check that the organization

    has properly analysed and treated its informationsecurity risks and continues managing itsinformation security risks systematically.

    A certificate of compliance from an accreditedcertification body has credibility with otherorganizations

    Certification

    Audit

    m

    http://www.iso27001security.com/http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    18/21

    2012ISO27kForum

    The organization shall continually improve the

    effectiveness of the ISMS through the use of:

    The information security policy;

    Information security objectives;

    Audit results;

    Analysis of monitored events;

    Corrective and preventive actions; Management review.

    Continual

    Improvement

    m

    http://www.iso27001security.com/http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    19/21

    2012ISO27kForum

    ISO/IEC 27001:2005. Information Technology - SecurityTechniques Information Security Management Systems Requirements. Known as ISO 27001.

    ISO/IEC 27002:2005. Information Technology - Security

    Techniques - Code of Practice for Information SecurityManagement. Known as ISO 27002.

    Alan Calder & Steve Watkins (2012). IT Governance: anInternational Guide to Data Security and ISO27001/ISO27002.

    5thedition. Kogan Page Publishing.

    m

    http://www.iso27001security.com/http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    20/21

    2012ISO27kForum

    Marty Carter MBCS CITP

    Managing Director Retrac Consulting Ltd Tel: +44 (0) 7920 074261

    Fax: +44 (0) 1242 292003

    Email: information@retrac-

    consulting.co.uk Web: www.retrac-consulting.co.uk

    Retrac Consulting provides

    consultancy advice on the provision

    of an Information Assurance regime

    for an organisation to protect their

    information assets, data and

    systems on which the data is stored,

    processed and transmitted. This isachieved through the assessment of

    threats to information systems, an

    analysis of the vulnerabilities that

    might be exploited by those threats,

    an understanding of the impact of

    identified risks, and the application oftechnical and non-technical

    countermeasures to reduce those

    risks to an acceptable level for the

    business.

    m

    mailto:[email protected]:[email protected]://www.retrac-consulting.co.uk/http://www.retrac-consulting.co.uk/http://www.retrac-consulting.co.uk/http://www.retrac-consulting.co.uk/mailto:[email protected]:[email protected]:[email protected]://www.iso27001security.com/http://www.iso27001security.com/
  • 8/10/2019 ISO 27001 presentacion.ppt

    21/21

    2012ISO27kForum

    This work is copyright 2010, ISO27k Forum, somerights reserved. It is licensed under the CreativeCommons Attribution-Noncommercial-Share Alike 3.0License. You are welcome to reproduce, circulate, useand create derivative works from this provided that:

    (a) It is not sold or incorporated into a commercialproduct;

    (b) It is properly attributed to the ISO27k Forum at

    www.ISO27001security.com; and(c) If shared, derivative works are shared under the same

    terms as this.

    http://www.iso27001security.com/