ISO27k ISMS and Controls Status WTTH SoA and Gaps
ISO27k ISMS and Controls Status WTTH SoA and Gaps
ISO27k ISMS and Controls Status WTTH SoA and Gaps
Statement of Applicabi
Controls Status (gap ana
Introduction
This spreadsheet is used to record and track the status of your organization as you implement the mandator
The main body of ISO/IEC 27001 formally specifies a number of mandatory requirements that must be fulfill
compliant with the standard. All the mandatory requirements for certification concern the manage
the standard requires management to determine the organization's information security risks, assess them,
policies and procedures defined in the ISMS. It does not mandate specific security controls.
However, Annex A to '27001 outlines a suite of information security controls that the management system w
organization (which depends on its information security risks). The security controls in Annex A are explaine
regulations etc.
Instructions
1. Design and implement an ISMS complying with all the mandatory elements specified in the main body of
mandatory
ISMS
requirements
sheet
to track
and
record
its status.
2. Identify and
assess
the information
security
risks
facing
those
parts of the organization that are declared
using the drop-down selectors in the status column of the annex A controls sheet. Note: do not feel con
additional rows if you determine that other security controls are needed to treat your information security ri
merely a guide, a starting point.
3. Systematically check and record the status of your security risks and controls, updating the status colum
4. Once your ISMS is operating normally, the metrics are looking good and you have amassed sufficient ev
accredited certification body. They will check that your ISMS fulfills the standard's mandatory requirements
and monitored according to the ISMS policies and procedures. Thereafter, the spreadsheet should both be m
and periodically reviewed/audited.
History
and
acknowledgements
Bala Ramanan
donated
the original ISO/IEC 27001:2005 version of the 27001 requirements worksheet.
Joe
the
ISO27k
Toolkit
Ed Hodgson updated the workbook for ISO/IEC 27001:2013. Gary Hinson fiddled with the wording and forma
ISO27k Toolkit.
Copyright
This work is copyright 2014, ISO27k Forum, some rights reserved. It is licensed under the Creative Comm
reproduce, circulate, use and create derivative works from this provided that (a) it is not sold or incorporated
www.ISO27001security.com,
and (c)any
derivative
works
thatand
are 27002
shared to
with
thirdmuch
partiessense
are subject
thean
s
Note:
you need licensed copies
of both
ISO/IEC
27001
make
of this,
is not sufficient! In particular, we have paraphrased and shortened the wording of the standards in ways
the
ISO27k
not this workbook.
Please
visit standards,
ISO27001security.com
for further advice and guidance on the ISO27k standards, including the IS
Toolkit:
www.ISO27001security
Sectio
n
Organisational context
Determine the organization's ISMS objectives and any issues that might affect its
? Unknown
effectiveness
4.2
Interested parties
4.2 (a)
4.2 (b)
4.3
4.3
Leadership
Leadership & commitment
Top management must demonstrate leadership & commitment to the ISMS
6
6.1
6.1.1
Defined
Policy
5.2
5.3
Limited
5.2
5.3
Initial
ISMS
5.1
5.1
Limited
ISMS scope
4.4
4.4
Planning
Actions to address risks & opportunities
Design/plan the ISMS to satisfy the requirements, addressing risks & opportunities ? Unknown
6.1.2
6.1.3
6.2
6.2
Support
7.1
Resources
Determine and allocate necessary resources for the ISMS ? Unknown
7.1
7.2
7.2
Competence
Determine, document and make available necessary competences ? Unknown
7.3
Awareness
Establish a security awareness program ? Unknown
7.3
7.4
7.4
Communication
Determine the need for internal and external communications relevant to the
? Unknown
ISMS
7.5
7.5.1
7.5.2
Documented information
Provide documentation required by the standard plus that required by the
? Unknown
organization
Provide document titles, authors etc., format them consistently, and review &
? Unknown
approve them
Control the documentation properly ? Unknown
7.5.3
8
8.1
8.1
8.2
8.2
8.3
8.3
9
9.1
9.1
Notes
4.1
4.1
Status
Operation
Operational planning and control
Plan, implement, control & document ISMS processes to manage risks (i.e. a risk
? Unknown
treatment plan)
Performance evaluation
Monitoring, measurement, analysis and evaluation
Monitor, measure, analyze and evaluate the ISMS and the controls ? Unknown
9.2
Internal audit
Plan & conduct internal audits of the ISMS ? Unknown
9.2
9.3
Management review
9.3
10 Improvement
10.1
10.1
10.2
10.2
Continual improvement
Continually improve the ISMS ? Unknown
27
01/10/2017
Number of requirements
Page3 of 8
Statement
of Applicability and status of information security controls
Sectio
n
Status
Notes
A5.1.1
? Unknown
A5.1.2
Nonexistent
Internal organization
A6.1.1
A6.1.2
Segregation of duties
A6.1.3
A6.1.4
A6.1.5
A6.2
Initial
Limited
Defined
Managed
Optimized
A6.2.1
Optimized
A6.2.2
Prior to employment
A7.1.1
Screening
? Unknown
A7.1.2
? Unknown
A7.2
During employment
A7.2.1
Management responsibilities
? Unknown
A7.2.2
? Unknown
A7.2.3
Disciplinary process
? Unknown
A7.3
A7.3.1
? Unknown
A8 Asset management
A8.1
? Unknown
A8.1.2
Ownership of assets
? Unknown
A8.1.3
? Unknown
A8.1.4
Return of assets
? Unknown
A8.2.1
Classification of information
? Unknown
A8.2.2
Labelling of information
? Unknown
A8.2.3
Handling of assets
? Unknown
A8.3.1
? Unknown
A8.3.2
Disposal of media
? Unknown
A8.3.3
? Unknown
A8.1.1
A8.2
A8.3
Information classification
Media handling
A9 Access control
A9.1
? Unknown
? Unknown
A9.1.1
A9.1.2
A9.2
A9.2.1
? Unknown
A9.2.2
? Unknown
A9.2.3
? Unknown
A9.2.4
? Unknown
A9.2.5
? Unknown
A9.2.6
? Unknown
A9.3
A9.3.1
A9.4
User responsibilities
Use of secret authentication information
? Unknown
A9.4.1
? Unknown
A9.4.2
? Unknown
01/10/2017
Page 4 of 8
Statement
of Applicability and status of information security controls
Sectio
n
Status
A9.4.3
? Unknown
A9.4.4
? Unknown
A9.4.5
? Unknown
Notes
A10 Cryptography
A10.1
Cryptographic controls
A10.1.1
? Unknown
A10.1.2
Key management
? Unknown
Secure areas
A11.1.1
? Unknown
A11.1.2
? Unknown
A11.1.3
? Unknown
A11.1.4
? Unknown
A11.1.5
? Unknown
A11.1.6
? Unknown
A11.2.1
? Unknown
A11.2.2
Supporting utilities
? Unknown
A11.2.3
Cabling security
? Unknown
A11.2.4
Equipment maintenance
? Unknown
A11.2.5
Removal of assets
? Unknown
A11.2.6
? Unknown
A11.2.7
? Unknown
A11.2.8
? Unknown
A11.2.9
? Unknown
A11.2
Equipment
A12.1.1
? Unknown
A12.1.2
Change management
? Unknown
A12.1.3
Capacity management
? Unknown
A12.1.4
? Unknown
A12.2
? Unknown
Information backup
? Unknown
A12.4.1
Event logging
? Unknown
A12.4.2
? Unknown
A12.4.3
? Unknown
A12.4.4
Clock synchronisation
? Unknown
A12.2.1
A12.3
Backup
A12.3.1
A12.3
A12.5
A12.5.1
A12.6
? Unknown
A12.6.1
? Unknown
A12.6.2
? Unknown
A12.7
A12.7.1
? Unknown
A13.1.1
Network controls
? Unknown
A13.1.2
? Unknown
A13.1.3
Segregation in networks
? Unknown
A13.2
A13.2.1
Information transfer
Information transfer policies and procedures
? Unknown
01/10/2017
Page 5 of 8
Statement
of Applicability and status of information security controls
Sectio
n
Status
A13.2.2
? Unknown
A13.2.3
Electronic messaging
? Unknown
A13.2.4
? Unknown
Notes
A14.1.1
? Unknown
A14.1.2
? Unknown
A14.1.3
? Unknown
A14.2
? Unknown
A14.2.2
? Unknown
A14.2.3
? Unknown
A14.2.4
? Unknown
A14.2.5
? Unknown
A14.2.6
? Unknown
A14.2.7
Outsourced development
? Unknown
A14.2.8
? Unknown
A14.2.9
? Unknown
? Unknown
A14.2.1
A14.3
Test data
A14.3.1
A15.1.1
? Unknown
A15.1.2
? Unknown
? Unknown
A15.1.3
A15.2
A15.2.1
? Unknown
A15.2.2
? Unknown
? Unknown
A16.1.2
? Unknown
A16.1.3
? Unknown
A16.1.4
? Unknown
A16.1.5
? Unknown
A16.1.6
? Unknown
A16.1.7
Collection of evidence
? Unknown
? Unknown
A17.1.2
? Unknown
A17.1.3
? Unknown
A17.1.1
A17.2
Redundancies
A17.2.1
? Unknown
A18 Compliance
A18.1 Compliance with legal and contractual requirements
A18.1.1
? Unknown
A18.1.2
? Unknown
A18.1.3
Protection of records
? Unknown
A18.1.4
? Unknown
A18.1.5
? Unknown
A18.2
A18.2.1
? Unknown
A18.2.2
? Unknown
01/10/2017
Page 6 of 8
Statement
of Applicability and status of information security controls
Sectio
n
A18.2.3
Status
Notes
? Unknown
114
01/10/2017
Number of controls
Page 7 of 8
Status
Proportion Proportion of
of ISMS
information
requirement
security
s
controls
Meaning
Has not even been checked yet
74%
93%
7%
1%
4%
1%
7%
1%
4%
1%
0%
1%
0%
2%
4%
1%
Total
100%
100%
? Unknown
Nonexistent
Initial
Limited
Defined
Managed
Optimized
Not applicable
? Unknown
Nonexistent
Initial
Limited
Defined
Managed
Optimized
Not applicable
? Unknown
Nonexistent
Initial
Limited
Defined
Managed
Optimized
Not applicable