Overview of ISO 27K
Overview of ISO 27K
Management Standard
2010 April 3
Tags: ISO, ISO 14001, ISO 27001, ISO 27001 Consultant, ISO 27001 Documentation, ISO 9001, ISO
certificate, ISO Consultancy, ISO Services, ISO Training
Posted by sales
Technical Requirements
Management Commitment
Policy
Objectives
Roles & responsibility
Communication
Resources
Levels of Risks
Scope of ISMS:
Define scope based on Business Characteristics, Organizational Characteristics, Locations, Information
Assets and Technology
Scope defines the ISMS deployed for all Information Assets- For Basic Focus on identified Information
Assets for effective controls with geographical and logical boundaries.
Location 1 can be covered with appropriate Internal Access control and control for External
Communication channel based on risk assessment.
Management Responsibility
Management Support
Management Commitment
Management Approval
Management Communication
Asset valuation for each of the asset information within the logical and physical boundary
Asset 1: Severity 1 ….3 or H/M/L (Give weight age rather than ranks) for CIA condition (Severity 3:
serious damage based on disclosure of information (Confidentiality factor) i.e. Impact of Asset
Information on Business with respect to CIA factors.
Define criteria for identification and classification of risks based on Impact.
Segregate Critical Asset Information based on Impact value and Business Impact.
Identify Asset Owners
Management of Risks.
Clock Synchronization
For integrity of Data – Configuration Management
For effective Scheduling i.e. Patch Updates, Antivirus uploads
All Systems are in Sync.
What is Risk Assessment?
Assessment of threats to information, impacts on and the vulnerabilities of information and
information processing facilities and the likelihood of their occurrences.
Assets and Scope
Threats
Vulnerability
Degree of Impact on CIA
Threat-Vulnerability-and-Risk-Relationship
Types of Threats
Vulnerabilities
Technical: Virus not updated, Unprotected connections to network
Approach:
Asset Value
Business Impact
Probability of Occurrence
Probability of Detection
Risk Index = (Asset Value x Business Impact x Probability of Occurrence) x Probability of Detection (Use
Low value of Detection i.e. 1 if High Detection rate)
Risk Management: The process of Identifying, controlling and minimizing or eliminating
Security risks that affects the information asset for an acceptable cost.
Risk-Management-Assessment-Diagram
Risk Treatment (Control of vulnerabilities): Controls selected and implemented to reduce the risk –
Preventive (Reducing Probability of Occurrence), Detective (Improving Probability of Detection) or
Corrective. May be physical, procedural or product based on Cost and Impact. Business Decision is required.
Revisit RIN Value for Probability Of Occurrence and Probability of Detection based on RTP
Revisit RTP based on changes to Business requirements and priorities. Addition of New Assets, threats
and vulnerabilities.
Review effectiveness of Existing Controls.
A 4: Organization Security
Identification of Assets
Classification of Assets
Labeling of Assets
A 6: Personnel Security
Security Incident
An activity output, which affects the CIA of the information, Asset identified.
Security Incident validates the perceptive value of CIA and the Business Impact captured during the initial
Risk Assessment.
Identify the Organization Perimeter and the associated Entry and Exit Points and the access controls
available: Site Plan and Network Plan
Securing Offices, rooms and facilities – Define access controls-: Sample Access Logs, Stock of
Cards, and Loss Card Handling.
Isolated delivery and loading areas
Equipment Security
Risk Analysis
Cost Benefit Analysis and Prioritization
Plan scope and Escalation
Design and Development of Business Continuity Plan
Implement and Test
BCP
Identification of Risks
Cost Benefit Analysis
Framework based on Types of Disaster- Location, City, Country
Criticality of Projects
Identify Critical Projects and who are the associated resources and infrastructure.
Impact on Slash.
Critical Activity Chart: post Disaster and the Time required for recovery.
Testing.
Access Control