MSTC ISMSManual PDF
MSTC ISMSManual PDF
MSTC Limited
225-C, A J C Bose Road
Kolkata 700 020
Internal
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Contents
Internal
Page2 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Internal
Page3 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Internal
Page4 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Internal
Page5 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Internal
Page6 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Internal
Page7 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
10.11.09 Address of DR site in scope changed from 609 Raheja 2.4 CISO
Center to 607 Raheja Center
12.05.11 The scope remaining the same, the wordings have been 2.8 CISO
changed for making it more descriptive.
Internal
Page8 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Internal
Page9 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Activities
As on date, MSTC has two major portfolios of business. One is known as the Marketing Division
which looks after the procurement of industrial raw materials in bulk for its Principals. The
sourcing is done either from foreign manufacturers / traders or from domestic producers. The
items that are procured include HMS, HR Coil, Billets, Wire Rods, LAM Coke, Coking coal, Naphtha
etc which are mainly consumed by the steel industry in the country.
The second portfolio provides a virtual marketplace for domestic sellers and buyers to do business
in metal scrap (ferrous/non-ferrous), surplus stores, machineries, obsolete spares, vehicles, Plants
etc. The methodology adopted includes open tender, public auction and e-auction.
Of late, MSTC has emerged as a major player in the country for promoting e-commerce. Its e-
auction portal namely www.mstcecommerce.com have become popular tool for transacting
business over the internet in a transparent manner. MSTC has developed an e-procurement module
and is ready with its e-procurement services.
Financial Results
Since inception, MSTC has always made profits and has paid dividends to its shareholders. The
shareholders investment in the company was Rs 1.10 crore and by issuing bonus shares @1:1, the
paid up capital was increased to Rs 2.20 crore. The General Reserves of the company as on
31.3.2006 is in excess of Rs 150 crore.
Internal
Page10 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Internal
Page11 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
The management has defined a set of security objectives which shall be reviewed at least once in
a year and initiatives for further improvement of security would be discussed in the review
meeting.
The Security Objectives for the e-commerce portal are identified and consists of the following:
Measurement of the effectiveness of the security controls through analysis of relevant logs and
records such as incident report, access logs, network logs, BCP test etc. and technical compliance
will verify the achievement of security objectives.(Ref: ME)
A defined Information Security Policy Statement is in place (Ref: S_POLICY) which is approved by
CMD and displayed at various places.
Scope
The ISMS offers protection to all information processed stored in the E-commerce servers or
transmitted through it and desktops connected to E-commerce servers through a dedicated LAN.
The e-commerce server and the desktops are located at the 3rd floor of MSTC LTD H.O. having its
address at 225C, AJC Bose Road, Kolkata-700 020. It also includes the following :
1 Law, HR and Admin functions associated with e-commerce.
2 DR site located at 607 Raheja Centre, Nariman Point, Mumbai - 400 021.
3 Development Server located at the 3rd floor of MSTC LTD H.O. having its address at
225C, AJC Bose Road, Kolkata-700 020
MSTC E-commerce group adopts an unique Risk Management approach for its information assets.
This approach is based on qualitative risk analysis model for assessing and maintaining the risk
framework implements certain formulas that would be seen as quantitative approach. This unique
approach ensures proper identification and measure of the assets risks and corresponding
mitigation controls that have been implemented.
The detailed risk assessment methodology can be found in the document Risk Assessment
Internal
Page12 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Statement of applicability
The statement of applicability with respect to the ISMS implementation is prepared an approved by
the management.
The SoA document enlists the controls as per the ISO 27001 standard [Ref: ISO 27001], the
applicability/ implementation status along with a statement on the basis of their selection or non-
selection. [Ref: SoA: Statement of Applicability]
Implement and operate the ISMS (4.2.2)
In line with MSTCs risk management approach, the risk treatment plan [Ref: RTP] is also
documented in the same framework. The risk treatment plan includes the resources,
responsibilities and priorities along with action taken by the MSTC management towards the risk
identified. These are documented, implemented and reviewed from time to time by various
methods.
A risk treatment plan is arrived stating the technology and the process controls to be
implemented. This is presented to the management team for approval. The senior management
reviews the approach as well as the solution and then approves the treatment plan, which includes
steps to be taken to mitigate a particular risk. The E-commerce Group consults on the various
aspects of the treatment plan and develops the solution approach.
The scope of ISMS is limited to E-commerce portal and employees working in it are all IT qualified
and are aware of the security aspects. A formal awareness program is imparted on ISMS and a dos
and donts on information security are informed both verbally and in the form of hard copy. The
employees of E-commerce group signs an agreement on maintaining the security and
confidentiality at the time of appointment.
The E-commerce System team is equipped with sufficient knowledge and infrastructure to ensure
that they will be able to implement the required controls with the desired effectiveness and
maintain information security to the fullest extent.
The ISMS operations are lead by CISO & Technical Manager with the help of other E-commerce
team members. The roles and responsibilities of all persons falling under the scope are defined in
the document Ref: Roles & Responsibilities.
The E-commerce implements various procedures and controls to ensure effective, consistent and
operations. These procedures are documented as part of the standards and procedures define
reviewed at-least once a year OR when significant changes occur to the infrastructure. These
procedures assist the IT group carrying out the activities in a structured manner. The procedures
defined include the following broad areas:
The above chapters contain detailed explanation with respect to the expectations from the
management on various facets of IT management. These procedures along with various checklists
help MSTC to monitor, detect and correct all activities pertaining to information activities which
are performed by the various domains (Windows, Linux) described in this document and are used
for monitoring and reviewing purposes by E-commerce group.
Adequate measures have been taken and technical as well as other control as relevant deployed to
enable prompt detection of any security events. The information security policy details the
manner to respond to any security incident.
Effectiveness of all security controls are measured and actions taken accordingly if effectiveness
found to be low. The effectiveness and the meeting of security objectives are measured through
Internal
Page13 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
analysis of relevant logs and records such as incident report, access logs, network logs, BCP test
etc. and technical compliance (Ref: TCCPR)
Internal
Page14 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Internal
Page15 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
risk management exercises by reviewing the risk assessment exercise and determining acceptable
levels of risk.
The chart below gives an overview of the hierarchy with respect to the Information security
management.
Internal
Page16 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
CMD
D(F) D(C)
HOD(F&A)
HOD(P&A)
CISO Tech.Manager
ISO 1 &
ISO 2
Attendants
DR SITE
RM
ISO 1 &
ISO 2
(Roles & Responsibilities of each individual above is described in document Roles &
Responsibilities)
#Tech. Manager, ISO 1 and ISO 2 are referred in ISMS as E-commerce System Security Group.
#CISO, Tech.Manager, ISO 1, ISO 2 is referred as E-commerce System Group / E-commerce Group.
#Management Team or MISF Ref: Roles & Responsibilities
Bold lines indicates Reporting To
Dash lines indicate the interfaces.
Internal
Page17 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
If the Technical Manager feels that a particular training is necessary for developing the
competence level of a system personnel associated with e-commerce, a proposal may be sent by
him or through CISO to management, following the normal practice. After the approval, HR will
make arrangements for the said training. Training records will be maintained by HR.
CISO or Technical Manager encourages ISOs for attending security related seminars.
The management team carries out a review of the status of implementation of the ISMS program
at least twice a year within MSTC. The presentation from the CISO also contains the activities that
Internal
Page18 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
were carried but were not part of the yearly planner as such activities are included to take care of
the emerging business scenario.
During the management review meeting, the following reports are reviewed:
Status of various corrective & preventive actions initiated
Reports on internal audits
Incident reports
Any changes to ISMS documentation/operation based on the incidents, feedbacks
received during the course of operations.
Security policy for its continued suitability, adequacy and effectiveness
Results of the measurement of effectiveness
Business Continuity Review
The Minutes of Meeting are prepared for each Management Review Meeting. The minutes
document the improvement areas identified, modifications to procedures concerning information
security, as well as any changes to the current business processing which are mandated due to
increase / decrease in threat scenario. The need (if any) to augment the resource requirement to
carry out the ISMS activities are also identified.
The minutes of the meeting shall also describe any need to increase or carry our specific security
activities due to contractual as well as change in regulatory aspects.
The minutes of the management review meeting shall be circulated to the management team for
discussion.
The internal audit team conducts the internal audit of the information security activities standards
and procedures as well as ISMS. The CISO along with the relevant members from the management
team draw an action plan to address the observations in the internal audit report.
Internal
Page19 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
identified threat
Compliance to ISO 27001 annexure control
MSTC shall comply with the ISO 27001 annexure controls, the controls as well as the objectives
described in the sections given below:
Internal
Page20 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Annexure Controls
Security policy (A.5)
Information security policy (A.5.1)
Control Objective: To provide management direction and support for information security in
accordance with business requirements and relevant laws and regulations.
Information Security Policy document (A.5.1.1)
Information Security Policy Manual (ISPM) shall be approved by CMD. The documents shall be kept
as soft copy in the designated file server with shared access to the E-commerce Group,
Administration and HR. It is applicable to all users defined in the scope.
Minutes of the review committee meeting will be recorded in details with signatures from all
the concerned members. Decision on major issues will be discussed and decision taken will be
recorded and management approval for same will be obtained.
The CISO / Tech. Manager shall report to the top management on any security related issues, and
Internal
Page21 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
such discussions should be properly recorded with actions taken if any. All activities of the
management team detailed above will be documented.
Internal
Page22 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Asset Type
Asset ID
Asset Description
Acquisition Date
Asset Owner
Location
Backup Information
License Information (If any)
Business Value
Internal
Page23 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
As per the above scheme each asset shall be having two classifications, one based on
Confidentiality and another based on Integrity/Availability.
For further details of asset valuation refer the Risk Assessment Procedure [Ref: RAPR: Risk
Assessment Procedure]. CISO will be responsible to define the classification of an asset, review it
atleast once a year and ensure it is kept up to date.
Internal
Page24 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Procedures for chain of custody and logging of any security relevant event will be defined.
Internal
Page25 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Control objective: To ensure that employees, contractors and third party users understand their
responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of
theft, fraud or misuse of facilities.
Control objective: To ensure that all employees, contractors and third party users are aware of
information security threats and concerns, their responsibilities and liabilities, and are equipped to
support organizational security policy in the course of their normal work, and to reduce the risk of
human error.
Management responsibilities(A.8.2.1)
Top management shall require employees and third party users to apply security in accordance
with established policies and procedures of MSTC. Top management shall communicate the
security roles & responsibilities to the employees the relevant documents by them, and shall
motivate them to adhere to the security procedures by communication of the benefits of the
same.
Internal
Page26 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Control objective: To ensure that employees, contractors and third party users exit MSTC or
change employment in an orderly manner.
Control objective: To prevent unauthorized physical access, damage and interference to MSTCs
premises and information at Kolkata office and DR site at Mumbai.
Internal
Page27 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
desk policy. Security personnel man the total third floor where the secured zones are situated.
* Secure zone (Data Center) includes the Server room and the attached System Room (SZ1)
and cubicles of some ecommerce personnel (SZ2).
Control Objective: To prevent loss, damage, theft or compromise of assets and interruption to the
organizations activities.
Internal
Page28 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Control Objective: To ensure the correct and secure operation of information processing facilities.
Internal
Page29 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Control Objective: To implement and maintain the appropriate level of information security and
service delivery in line with third party service delivery agreements.
Internal
Page30 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
No unauthorized software can be installed on e-commerce server without the knowledge of CISO
and this has been communicated to all members of e-commerce team.
Refer [Ref: ISPM] for detailed anti-virus policy and Malicious code policy.
Back-up (A.10.5)
Control Objective: To maintain the integrity and availability of information and information
processing facilities.
Control Objective: To ensure the protection of information in networks and the protection of the
supporting infrastructure.
Internal
Page31 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
entrusted user networks .A NIDS is placed in between internet and Critical E-commerce server
group to detect intrusion attempts from the outside world. MSTC uses a secure log on procedure so
that not display systems or application identifiers until the log-on process has successfully
completed. Array of controls are implemented in the network and application systems for secure
e-procurement transaction using Digital Signature.
Remote administration of the servers and network devices should be avoided as far as possible. If
done it should be done using SSH.
Network administration is conducted by a skilled ISO under the supervision of the Technical
Manager.
Internal
Page32 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Control Objective: To maintain the security of information and software exchanged within an
organization and with any external entity.
Control Objective: To ensure the security of electronic commerce services, and their secure use.
E-commerce service is provided by MSTC for its customers and principals. All concerned parties are
provided with user-id and password without which no one can make any transaction. Proper terms
and conditions are present to protect contract dispute. Moreover all transactions are passed over
SSL.
Trading partners before starting transaction has to agree to terms and conditions where
protections are kept for any legal dispute. (Ref:www.mstcecommerce.com)
Internal
Page33 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Monitoring (A.10.10)
Call is placed if not at the capacity of the internal systems people and is maintained in a register.
Record of Fault logging is made in a register.
If the problem is resolved to the satisfaction of the e-commerce group then the case is closed in
the register.
Clock synchronization (A.10.10.6)
Clock Synchronization will take place from a certified time-stamping server.
Transactions logs are based on single server (time stamping server) time.
Internal
Page34 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Administrator passwords of the critical servers and the network devices are used by the authorized
e-commerce team members responsible for system administration.
Control Objective: To ensure authorized user access and to prevent unauthorized access to
information systems.
The e-commerce applications should have its own secure user registration / de-registration
process.
Internal
Page35 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Control Objective: To prevent unauthorized user access, and compromise or theft of information
and information processing facilities
Users shall not connect any new resources (e.g. personal laptop, modem) to the MSTC network
without getting prior approval from the CISO/Technical Manager.
Internal
Page36 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Internal
Page37 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Control Objective: To ensure information security when using mobile computing and teleworking
facilities.
Teleworking (A.11.7.2)
NOT APPLICABLE
Internal
Page38 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
The procurement process shall consist of suitable acceptance testing of the systems ensuring
compliance to the security requirements. Testing Records for the purpose of Acceptance of
hardware & software being maintained by TM.
Internal
Page39 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Control objective: To maintain the security of application system software and information.
Internal
Page40 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Control objective: To ensure information security events and weaknesses associated with
information systems are communicated in a manner allowing timely corrective action to be taken.
Internal
Page41 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Control objective: To ensure a consistent and effective approach is applied to the management of
information security incidents.
Control objective: To counteract interruptions to business activities and to protect critical business
processes from the effects of major failures of information systems or disasters and to ensure their
timely resumption.
Internal
Page42 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Compliance (A.15)
Control objective: To avoid breaches of any law, statutory, regulatory or contractual obligations,
and of any security requirements.
The following rules will be maintained while keeping the organizational records and/or
choosing the storage media/technology:
Internal
Page43 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
Disposal of all information assets will be made after destruction of sensitive data.
The retention period of the storage of the organizational records will be in line with
national/regional laws or as per requirement of principals.
At log-on to the e-commerce portal a terms & condition page will be presented to the user/viewer
mentioning all the terms and conditions related to the authorizations. The user/viewer has to
acknowledge and accept to the message on the screen to continue with the log-on process.
Control objective: To ensure compliance of systems with organizational security policies and
standards.
Internal
Page44 of 45
ISO 27001 ISMS Manual DOC-ID: ISMS
Version 2.9 Date 07-05-2012
All information systems before putting on to the production environment are tested on a
development server and being approved by concerned users.
Security concerns are kept in mind while information systems are installed through logs in servers.
Control objective: To maximize the effectiveness of and to minimize interference to/from the
information systems audit process.
Internal
Page45 of 45