Information Security Management Systems (ISMS)
I. ISO/IEC 27001
To obtain an ISO 27001 certificate, organizations must follow:
- Conduct a gap analysis to identify gaps between current info security practices and ISO 27001 requirements.
- Develop an ISMS that meets ISO 27001 requirements, including policies, procedures, and controls for managing information security risks, based on the gap analysis.
- Implement the ISMS across the organization, ensuring policy and procedure compliance by all employees.
- Conduct internal audits to ensure ISMS effectiveness and identify improvement areas.
- Conduct a certification audit: Engage an accredited certification body to assess the organization's ISMS compliance with the ISO 27001 standard.
- Correct any non-conformities identified during certification audit.
If the organization's ISMS meets the requirements of the ISO 27001 standard, the certification body (e.g., Bureau Veritas, DNV GL, Lloyd's Register Quality Assurance, SGS, BSI Group, TUV SUD, Intertek, or NSF International) will issue an ISO 27001 certificate.
I.1 ISO 27001 ANNEX A: ISO 27001 Annex A is a part of the ISO 27001 standard that provides a comprehensive list of information security controls that organizations can use to establish an effective ISMS. Annex A contains the following 14 control categories and 114 individual controls:
- Security policy
- Organization of information security
- Asset management
- Human resources security
- Physical and environmental security
- Communications and operations management
- Access control
- Information systems acquisition, development, and maintenance
- Information security incident management
- Business continuity management
- Compliance
- Cryptography
- Operations security
- Supplier relationships
Each control category includes a set of controls that are designed to address specific risks and vulnerabilities related to information security. The controls are intended to be implemented based on the organization's risk assessment and risk management processes, considering the organization's specific needs and circumstances.
By using Annex A as a guide, organizations can ensure
that they have implemented a comprehensive set of information security controls
that are aligned with the requirements of ISO 27001. This can help to minimize
the risk of security breaches and protect sensitive information, while also
ensuring compliance with relevant laws and regulations.
I.2 ISO 27001 IMPLEMENTATION:
1) Obtain management support:
In my experience, this is the main reason why ISO 27001 certification projects
fail – management is either not providing enough people to work on the project,
or not enough money.
2) Treat it as a project with a detailed
roadmap and milestone: ISO 27001 is a complex framework
involving various activities and lots of people, lasting from a couple of
months to more than a year depending on the size of an organization.
3) Define the scope: All network equipment, servers, clouds, PCs,
laptop, tablet, phone, and employees
4) Design Information Security Policy:
- Objectives: the general and specific objectives to be achieved by information security.
- Requirements: reference to legal, statutory, and contractual requirements that must be fulfilled.
- Risk management: reference to the process to select the information security controls.
- Responsibilities: responsibilities for implementation, maintenance, and reporting of ISMS performance.
- Communication: to whom this policy needs to be communicated.
- Support: commitment with resources to implement and improve information security.
5) Define the risk assessment methodology:
The purpose of the methodology is to define the rules for identifying the
risks, impacts, and likelihood, and to define the acceptable level of risk.
6) Perform risk assessment and treatment: Identify and address unacceptable risks through the use of Annex A controls. Create a Risk Assessment Report and obtain approval for residual risks.
7) Write the Statement of Applicability
(SoA): Once you have completed your risk assessment and
treatment process, you will know exactly which controls from ISO 27001 Annex A
you need. The purpose of this document is to list all controls and to define
which are applicable and which are not, the reasons for such a decision, and a
description of how they are implemented in the organization. The Statement of
Applicability is also the most suitable document to obtain management
authorization for the implementation of the ISMS.
8) Write the Risk Treatment Plan: Define exactly how the controls from the SoA are to be implemented – who is going to do it, when, with what budget, etc.
9) Define how to measure the effectiveness
of controls:
Define how you are going to measure the fulfillment of objectives you
have set both for the whole ISMS, and for security processes and/or controls.
10) Implement the security controls: Implement all necessary documents and technology and change security processes in your organization, which can be a challenging task since it involves enforcing new behavior and potentially creating new policies and procedures. Training and awareness are crucial for avoiding resistance to change.
11) Implement training and awareness programs: Educate employees and stakeholders on the ISMS policies, procedures, and controls. This helps ensure that everyone understands their roles and responsibilities in maintaining information security and encourages a culture of security awareness throughout the organization.
12) Operate the ISMS: Keep records (including logs) as proof of completed activities.
13) Track the performance of the ISMS: Monitor and measure its activities, including incidents, procedures, and results, to ensure they align with the established objectives.
14) Internal audit:
Identify unaware of existing or potential problems can hurt your organization
15) Management review:
Help management to make decisions approving the security budget, aligning
security with business strategy
16) Corrective and preventive actions: Correct any non-conformities and prevent future occurrences. Identify the root cause of the issue, resolve it, and verify that it has been resolved.
II. NIST CYCBER SECURITY FRAMEWORK
Comments
Post a Comment