CTC Proposal - Technical Communicators

Report
ISO/IEC 27001
Standard for Information
Security Management
Systems
© 2013 Cambridge Technical Communicators
Slide 1
Information Security Requirements
• ISO 27001 specifications
• ISO 27002 code of practise
• Download from BSI website:
http://17799.standardsdirect.org
• Information Security Forum (ISF) publish the 2007
Standard of Good Practise (SoGP)
© 2013 Cambridge Technical Communicators
Slide 2
Process
• A) Identify information security risks: threats,
vulnerabilities and impacts
• B) Design/implement information security controls: risk
management - risk avoidance/risk transfer
• C) Maintain security policy/
adopt management process
© 2013 Cambridge Technical Communicators
Slide 3
ISMS
• Information Security Management System
• Broad set of general and IT-specific policies and controls
that span the organisation
• Include IT, HR, management, business continuity,
incident management and other business
functions/areas:
© 2013 Cambridge Technical Communicators
Slide 4
Examples
• Teleworking/home working: access to data
• Training staff: on information security issues and
procedures
• Recruitment: security checks,
• Data retention policies: how long, where stored, how
backups are made, who can assess
• Staff roles: security permissions, access to sensitive
information
• Access to data by third parties and suppliers
© 2013 Cambridge Technical Communicators
Slide 5
Certification process
• Stage 1 - informal review of security documentation
• Stage 2 - formal and detailed compliance audit
• Stage 3 - Follow-up reviews and audits
© 2013 Cambridge Technical Communicators
Slide 6
Security Documents
• Security policy document
• Statement of Applicability (SoA)
• Risk Treatment Plan (RTP)
• Not all requirements in ISO 27001 are mandatory. You
can also define the scope to be covered by the security
policy
© 2013 Cambridge Technical Communicators
Slide 7
Mandatory requirements
•
•
•
•
Define scope
Define ISMS policy
Define roles and responsibilities
Define the risk assessment approach & criteria for
accepting risk
• Define a level of acceptability of risk
• List assets & define owners
• Identify threats, vulnerabilities, impact, likely-hood and
risk for each asset
© 2013 Cambridge Technical Communicators
Slide 8
Mandatory requirements
• Estimate levels of risk and define if risks are acceptable
or not
• Define risk options (accept, transfer, avoid or reduce)
for risks that are not acceptable
• List controls to implement
• Manage lifecycle of documentation
• Obtain management approval of residual; risks and for
implementation plan
• Manage resources
© 2013 Cambridge Technical Communicators
Slide 9
Mandatory requirements
•
•
•
•
•
•
•
•
Manage communications
Implement controls
Implement metric for each control
Monitor performance of the controls
Review effectiveness of the controls
Corrective actions
Preventive actions • Management reviews
Internal audits
• Write statement of applicability
© 2013 Cambridge Technical Communicators
Slide 10
ISMS Project Plan
• Identify documents and procedures required by ISO
27001;
Locate templates and forms
• List activities to implement security plan:
define scope; gap analysis, asset identification, risk
assessment, SOA, policies, business continuity, internal
audit
© 2013 Cambridge Technical Communicators
Slide 11
Thank you
We appreciate your interest in CTC
Tel: +44 0870 803 2095
Email: [email protected]
Web: www.technical-communicators.com
© 2013 Cambridge Technical Communicators
Slide 12

similar documents