Building ISMS PDF
Building ISMS PDF
concert with
further distribute this presentation only with this copyright
notice attached. If you use parts of this documentation in
presentations or other diagrams you have to refer to the source.
my peers.”
Any commercial use of this presentation is only allowed with
written consent of the author.
© 19.3.2007
Abstract
Building an ISMS based on ISO/IEC 27001 & ISO/IEC 17799
Almost every IT security professional has heard or read about BS7799-2 and/or
ISO 17799. Many have used the ISO 17799 to their advantage for designing,
implementing or even auditing information security – some have used it for writing
security policies and others actually for performing risk analysis. BS7799-2 (now
ISO 27001), however, is less known and its contents are often misunderstood.
ISO 27001 clearly defines how an Information Security Management System
(ISMS) should look like, describing actually the major security management
processes any company should have in place. This session explains the differences
between the “twin standards” ISO 27001 and ISO 17799, concentrating mostly on
the ISMS. It clearly shows how existing security organizations and security
management processes fit in such an ISMS and what steps your company should
take if you want to professionalize your information security management up to the
point where you could get certified. The session also shows many pitfalls that
companies might fall in, based on the speaker’s experience both in his capacity as
an official expert supervising the accredited certification bodies and as an IT
auditor and security consultant.
Typical unresolved
information security
problems
Problematic areas
Parallel internal control systems
Ineffective security organization
Contradictory directives & policies
Outsourcing out of control
Ineffective IT risk management
Inadequate awareness
Poor physical security
Unresolved business continuity issues
customer data
4 Malicious code
8 12 14 every 5 Access management
D 10 days
frequently 6 Telebanking (Phishing)
7 Patch management
1 3 5 4 9 13 every 8 Non-compliance with
100 days rules
C
likely 10 9 Network interrupt
10 Infringements
11 6 7 2 every 11 Loss of key personnel
1000 days
B
unlikely 12 Password handling
13 Application of new
15 16 every technologies
10.000 days
A 14 Application dependent
very unlikely
controls
15 Unsuited BCM/BCP
1 2 3 4 5
low medium high very high critical 16 Internal sabotage
SRI International
Survey of Industry
Shell Best Practices
SRI International
Shell Baseline
Baseline Controls
Security Controls
27000 to be
Terminology Overview published
& Vocabulary
27001 27006
Requirements ISMS Accreditation
Requirements Requirements
Brief explanation of
ISO/IEC27001
0 Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Information Security Management System
5 Management responsibility
6 Internal ISMS audits
7 Management review of the ISMS
8 ISMS improvement
– Annexes
© Peter R. Bitterli, Slide 23
ISMS – PDCA Model
Building an effective Information Security Management Systems
PLAN
Establish the
ISMS
DO ACT
Monitor and
review the ISMS
CHECK
© Peter R. Bitterli, Slide 24 Source: Peter Weiss, Zurich
Establish the ISMS
Building an effective Information Security Management System
Risk
management
PLAN
Define ISMS scope &
policy Establish the
ISMS
Maintain and
operate the ISMS
Implement and
Decide on risk treatment
DO ACT
Select controls
(from 17799)
CHECK
© Peter R. Bitterli, Slide 25 Source: Peter Weiss, Zurich
Implement and Operate ISMS
Building an effective Information Security Management System
Risk
management
PLAN
Formulate & implement
risk treatment plan Establish the
ISMS
Maintain and
operate the ISMS
Implement and
Implement
training/awareness DO ACT
Define effectiveness
measurement of controls
CHECK
© Peter R. Bitterli, Slide 26 Source: Peter Weiss, Zurich
Monitor and Review ISMS
Building an effective Information Security Management System
Risk
management
Execute monitoring PLAN
procedures
Establish the
Regularly review
ISMS
effectiveness of ISMS
CHECK
© Peter R. Bitterli, Slide 27 Source: Peter Weiss, Zurich
Maintain and Improve ISMS
Building an effective Information Security Management System
PLAN
Establish the
Implement improvements
ISMS
Maintain and
preventive actions
Ensure improvements
achieve objectives
Monitor and
review the ISMS
CHECK
© Peter R. Bitterli, Slide 28 Source: Peter Weiss, Zurich
Security Controls
Part 4
Brief explanation of
ISO/IEC17799 (will
become ISO/IEC 27002)
1 Scope
2 Terms and definitions General information
3 Structure of standards Organizational issues
4 Assessment and treatment of risks Technical issues
5 Security policy
6 Organisation of information security
7 Asset management
8 Human resource security
9 Physical and environmental security
10 Communications and operations management
11 Access control
12 Information systems acquisition, development and maintenance
13 Information security incident management
14 Business continuity management
15 Compliance
© Peter R. Bitterli, Slide 30
Security Policy
ISO/IEC 17799 (soon to become ISO/IEC 27002)
Policy
Security concept
(Baseline protection)
Guidelines
Responsibilities Classification
Inventory Classification policy
Assignment to Labelling and handling
“owners”
Acceptable use policy
Organizational
issues
5. Security
policy
6. Organization of
information security
13.Information security
15. Compliance incident management
Brief explanation of
accreditation and
certification processes based
on ISO/IEC27001 and
ISO/IEC 27006 (draft)
Compliance
is a self-assessment carried out by the
organization in order to verify whether a system
that has been implemented complies with a
standard.
Certification (Registration)
is conferred by an accredited certification body
when an organization successfully completes an
independent audit, thus certifying that the
management system meets the requirements of a
specific standard, e.g. ISO/IEC27001.
© Peter R. Bitterli, Slide 44
Terms (II)
Used in the context of accreditation & certification
Remark
A company may comply with ISO/IEC 17799, but
certification is only possible with ISO/IEC27001.
Accreditation
consists of the means by which an authorized
organization (the accreditation body) officially
recognizes the authority of a certification body to
evaluate, certify and register an organization’s
ISMS with regard to published standards.
Accreditation
Accreditation Body (AB)
s
s
cer
rt es
certifie
certifie
ce
tifie
tifi
Certified Certified
es
s
Company Company
s
Certified
Company
Certified
Certified
Certified Company Company
Certified Company
Company Certified
Company
Source: www.ceem.com
© Peter R. Bitterli, Slide 47
Certificates
Examples
ISO 9001
ISO 14001
ISO 27001 (originally: BS 7799-2 ISMS)
BS 15000 / ISO 20000
…
Source: www.iso27001certificates.com
Download on 2.2.2007
Stage 1 Stage 2
Review of ISMS Visit to the company
Documentation Review of compliance
Scope Security policies
ISMS Policy Security objectives
Risk report Procedures
Risk treatment ISMS
Statement of conform to ISO27001
Applicability achieves security
Core elements of ISMS objectives (as in
ISO17799)
Results of stage 2
Nonconformities
major
minor
Observations
Report
Audit team reports to CB
Company comments and specifies improvements
CB confirms corrections
Periodic
Often enough
Non-conformities must be corrected within
agreed time span
If not: reduction, suspension or recall of
certification
In planned intervals
Requirements:
ISO Guide 62 (and EN 45012):
Accreditation general Requirements/criteria
for Accreditation: applicable for
Body (AB) ISO 9001, ISO 14001, BS7799-2
EA 7/03 states more precisely
acc Guide 62 in relation to ISMS
red audits (will become ISO27006)
its
ISO 19001: Criteria for auditors’
competence
Certification …
Body (CB)
cer
tifi
es
Certified
company
© Peter R. Bitterli, Slide 55
© Peter R. Bitterli, Slide 56
Implementing an ISMS
Part 6
Establish the
Establish the
ISMS (phaseI)
ISMS (phaseII)
Monitor and
Monitor
review and
the ISMS
review
(phasetheI)ISMS
(phase II)
Maintain and
operate the ISMS
Implement and
Decide on risk treatment
DO ACT
Select controls
(from 17799)
CHECK
© Peter R. Bitterli, Slide 60 Source: Peter Weiss, Zurich
Define the Scope
“Easy” steps to implement an ISMS: Step 1
© Peter R. Bitterli, Slide 62 Source: ISO/IEC 27001 Chapter 4.2.1 Establish the ISMS
Define Areas of Applicability
“Easy” steps to implement an ISMS: Step 3
Establish
Therefore: put together a list of those
the ISMS
controls …
that cover:
legal and regulatory requirements
contractual obligations
organization’s business requirements
5.1
15.3 6.1
15.1
15.2
4 6.2
7.1
Current maturity level
14.1 7.2
(green area)
13.2
13.1
3 8.1
8.2
PLAN
12.6 2 8.3 Room for improvement
12.5 9.1
Establish
the ISMS
12.4
1 9.2
12.3 0 10.1
11.6 10.5
11.5 10.6
11.4 10.7
11.3 10.8
11.2 11.1 10.10 10.9
PLAN
I
improvement !
II
Establish Areas where controls
Severity
the ISMS
IV III
Possible savings
Low priority
Maintain and
operate the ISMS
Implement and
Implement
training/awareness DO ACT
Define effectiveness
measurement of controls
CHECK
© Peter R. Bitterli, Slide 68 Source: Peter Weiss, Zurich
Implement Risk Treatment
“Easy” steps to implement an ISMS: Step 6
DO
timers separately)
Collect same information from your peers
Start asking for more resources, argue with:
Increasing legal/regulatory requirements
Recent incidents from own organization
Incidents in headlines
Comparisons with peers
CHECK
© Peter R. Bitterli, Slide 72 Source: Peter Weiss, Zurich
Identify Security Incidents
“Easy” steps to implement an ISMS: Step 9
CHECK
CHECK
Security incidents
Results of security reviews
PLAN
Establish the
Implement improvements
ISMS
Maintain and
preventive actions
Ensure improvements
achieve objectives
Monitor and
review the ISMS
CHECK
© Peter R. Bitterli, Slide 76 Source: Peter Weiss, Zurich
Implement Improvements
“Easy” steps to implement an ISMS: Step 12
ACT
Keep track of progress
ACT
Establish the
Establish the
ISMS (phaseI)
ISMS (phaseII)
Monitor and
Monitor
review and
the ISMS
review
(phasetheI)ISMS
(phase II)
© Peter R. Bitterli, Slide 80 Source: ISO/IEC 27001 Chapter 4.3 Documentation Requirements
Improve Documentation (II)
“Easy” steps to implement an ISMS: Step 14b
© Peter R. Bitterli, Slide 81 Source: ISO/IEC 27001 Chapter 4.3 Documentation Requirements
Improve Documentation (III)
“Easy” steps to implement an ISMS: Step 14c
© Peter R. Bitterli, Slide 82 Source: ISO/IEC 27001 Chapter 4.3 Documentation Requirements
Control of Records
“Easy” steps to implement an ISMS: Step 15
© Peter R. Bitterli, Slide 83 Source: ISO/IEC 27001 Chapter 4.3.3 Control of records
Management Commitment
“Easy” steps to implement an ISMS: Step 16
Maintain and
operate the ISMS
Implement and
Decide on risk treatment
DO ACT
Select controls
(from 17799)
CHECK
© Peter R. Bitterli, Slide 85 Source: Peter Weiss, Zurich
Broaden the Scope
“Easy” steps to implement an ISMS: Step 17
PLAN
Establish
the ISMS
© Peter R. Bitterli, Slide 90 Source: ISO/IEC 27001 Chapter 4.2.1 Establish ISMS
Formal Risk Assessment (II)
“Easy” steps to implement an ISMS: Step 20b
of risks
Select control objectives and controls for
treatment of risks
Obtain management approval of residual risks
© Peter R. Bitterli, Slide 91 Source: ISO/IEC 27001 Chapter 4.2.1 Establish ISMS
Formal Risk Assessment (III)
“Easy” steps to implement an ISMS: Step 20c
PLAN
C 2 3 6 14 16 7 every
Establish probable 100 days
the ISMS
B 1 4 9 11 16 13 21 every
improbable 1000 days
A
highly improbable every
17 8 15 10 19 20 18 12 10,000 days
1 2 3 4 5
low medium high very high critical
Severity
Maintain and
operate the ISMS
Implement and
Implement
training/awareness
(phase II)
DO ACT
Define effectiveness
measurement of controls
CHECK
© Peter R. Bitterli, Slide 93 Source: Peter Weiss, Zurich
Implement Risk Treatment
“Easy” steps to implement an ISMS: Step 21
DO
Knowingly and objectively accept risks (provided they
clearly satisfy the organization’s policies and criteria
for accepting risks)
Check whether additional controls (e.g. not listed in
ISO/IEC 17799) need to be implemented
Determine how progress will be assessed
DO
CHECK
© Peter R. Bitterli, Slide 98 Source: Peter Weiss, Zurich
Improve Incident Management
“Easy” steps to implement an ISMS: Step 24
Monitor and
review the ISMS
CHECK
PLAN
Establish the
Implement improvements
ISMS
Maintain and
(phase II)
preventive actions
Ensure improvements
achieve objectives
Monitor and
review the ISMS
CHECK
© Peter R. Bitterli, Slide 103 Source: Peter Weiss, Zurich
Continuing Improvements
“Easy” steps to implement an ISMS: Step 28
An improved ISMS …
lowers probability of major security incidents
decreases severity of low probability scenarios
removes contradictions, bottlenecks and blind
spots
improves security awareness
lets you invest your $$$ more effective
demonstrates proper stewardship
gets the auditors off your back
lets you sleep well
…
© Peter R. Bitterli, Slide 109
© Peter R. Bitterli, Slide 110
Pitfalls to avoid
Part 9
“I will work in
concert with
my peers.”