Professional Documents
Culture Documents
Luke Irwin ISO 27001 ISMS (Information Security Management System)
Luke Irwin ISO 27001 ISMS (Information Security Management System)
ISO 27001 is the international standard that describes best practice for an ISMS (information security
management system).
The Standard takes a risk-based approach to information security. This requires organisations to
identify information security risks and select appropriate controls to tackle them.
Those controls are outlined in Annex A of the Standard. There are 114 ISO 27001 Annex A controls,
divided into 14 categories.
Contents
This annex is designed to make sure that policies are written and reviewed in line with the overall
direction of the organisation’s information security practices.
This annex covers the assignment of responsibilities for specific tasks. It’s divided into two sections,
with Annex A.6.1 ensuring that the organisation has established a framework that can adequately
implement and maintain information security practices within the organisation.
Meanwhile, Annex A.6.2 addresses mobile devices and remote working. It’s designed to make sure
that anyone who works from home or on the go – either part-time or full-time – follows appropriate
practices.
The objective of Annex A.7 is to make sure that employees and contractors understand their
responsibilities.
It’s divided into three section. Annex A.7.1 addresses individuals’ responsibilities prior to
employment, Annex A.7.2 covers their responsibilities during employment and Annex A.7.3
addresses their responsibilities when they no longer hold that role – either because they’ve left the
organisation or changed positions.
This annex concerns the way organisations identify information assets and define appropriate
protection responsibilities.
It contains three sections. Annex A.8.1 is primarily about organisations identifying information assets
within the scope of the ISMS.
Annex A.8.2 is about information classification. This process ensures that information assets are
subject to an appropriate level of defence.
Annex A.8.3 is about media handling, ensuring that sensitive data isn’t subject to unauthorised
disclosure, modification, removal or destruction.
The aim of Annex A.9 is to ensure that employees can only view information that’s relevant to their
job.
It’s divided into four sections, addressing the business requirements of access controls, user access
management, user responsibilities and system and application access controls, respectively.
This annex is about data encryption and the management of sensitive information. Its two controls
are designed to ensure that organisations use cryptography properly and effectively to protect the
confidentiality, integrity and availability of data.
This annex addresses organisation’s physical and environment security. It’s the largest annex in the
Standard, containing 15 controls separated into two sections.
The objective of Annex A.11.1 is to prevent unauthorised physical access, damage or interference to
organisation’s premises or the sensitive data held therein.
Meanwhile, Annex A.11.2 deals specifically with equipment. It’s designed to prevent the loss,
damage or theft of an organisation’s information asset containers – whether that’s, for example,
hardware, software or physical files.
Annex A.12 – Operations security (14 controls)
This annex ensures that information processing facilities are secure, and is comprised of seven
sections.
Annex A.12.1 addresses operational procedures and responsibilities, ensuring that the correct
operations are in place.
Annex A.12.2 addresses malware, ensuring that the organisation has the necessary defences in place
to mitigate the risk of infection.
Annex A.12.3 covers organisations’ requirements when it comes to backing up systems to prevent
data loss.
Annex A.12.4 is about logging and monitoring. It’s designed to make sure that organisations have
documented evidence when security events occur.
Annex A.12.5 addresses organisations’ requirements when it comes to protecting the integrity of
operational software.
Annex A.12.6 covers technical vulnerability management, and is designed to ensure that
unauthorised parties don’t exploit system weaknesses.
Finally, Annex A.12.7 addresses information systems and audit considerations. It’s designed to
minimise the disruption that audit activities have on operation systems.
It’s divided into two sections. Annex A.13.1 concerns network security management, ensuring that
the confidentiality, integrity and availability of information in those networks remains intact.
Meanwhile, Annex A.13.2 deals with the security of information in transit, whether it’s going to a
different part of the organisation, a third party, a customer or another interested party.
The objective of Annex A.14 is to ensure that information security remains a central part of the
organisation’s processes across the entire lifecycle.
Its 13 controls address the security requirements for internal systems as well as those that provide
services over public networks.
This annex concerns the contractual agreements organisations have with third parties.
It’s divided into two section. Annex A.15.1 addresses the protection of an organisation’s valuable
assets that are accessible to, or affected by, suppliers.
Meanwhile, Annex A.15.2 is designed to ensure that both parties maintain the agreed level of
information security and service delivery.
The aim of Annex A.17 is to create an effective system to manage business disruptions.
Its divided into two sections. Annex A.17.1 addresses information security continuity – outlining the
measures that can be taken to ensure that information security continuity is embedded in the
organisation’s business continuity management system.
Annex A.17.2 looks at redundancies, ensuring the availability of information processing facilities.
This annex ensures that organisations identify relevant laws and regulations. This helps them
understand their legal and contractual requirements, mitigating the risk of non-compliance and the
penalties that come with that.
ISO 27001’s security requirements aren’t simply within the remit of the organisation’s IT
department, as many people assume.
Rather, the Standard addresses each of the three pillars of information security: people, processes
and technology.
The IT department will play a role in risk treatment. Most obviously in technology, but also in
developing the processes and policies that ensure those technologies are used properly.
Most controls will require the expertise of people from across your organisation. This means you
should create a multi-departmental team to oversee the ISO 27001 implementation process.
They’re simply a list of possibilities that you should consider based on your organisation’s
requirements.
Annex A provides an outline of each control. You should refer back to it when conducting an ISO
27001 gap analysis and risk assessment.
These processes help organisations identify the risks they face and the controls they must
implement to tackle them.
The only problem with Annex A is that it only provides a brief overview of each control. While this is
good for reference use, it’s not helpful when actively implementing the control.
That’s where ISO 27002 comes it. It’s a supplementary standard in the ISO 27000 series, providing a
detailed overview of information security controls.
The Standard dedicates about one page to each control, explaining how it works and how to
implement it.
Identify the controls you should implement
Find out how to determine which controls you should implement by reading Nine Steps to Success –
An ISO 27001 Implementation Overview.
This essential guide contains a comprehensive explanation of ISO 27001, and includes a section
dedicated to the risk assessment process – complete with a five-step guide on how to conduct them.
Recommended reading:
Luke Irwin
Luke Irwin is a writer for IT Governance. He has a master’s degree in Critical Theory and Cultural
Studies, specialising in aesthetics and technology, and is a one-time winner of a kilogram of jelly
beans.
No Responses
Search
SOCIAL MEDIA
CATEGORIES
o Cyber Security
Business Continuity
Cyber Essentials
Cyber Resilience
ISO 27001
IT Governance
NIS Regulations
PCI DSS
Penetration Testing
Risk Management
o IT Best Practice
ITIL/ITSM/ISO 20000
Project Management
o News
o Other Blogs
Book Reviews
Podcast
o Phishing
o Privacy
Data Protection
EU GDPR
#BreachReady
o Ransomware
o Scotland
o Sectors
Education
Financial Services
Healthcare
Professional Services
Public Sector
Retail
o Secure Together
o Staff Awareness
o Training
o Uncategorised