Implementing ISMS 9 Steps Aug 19
Implementing ISMS 9 Steps Aug 19
Implementing an ISMS
The nine-step approach
For an organisation to secure its information, it must approach the task from the
perspectives of people, processes and technologies. These are interlinked. In the
simplest sense, a technology needs a person to manage and maintain it, and that
person needs to follow defined processes in doing so.
A project initiation document (PID) would be an ideal format for the mandate to
take.
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 4
The project plan is part of the process of gradually drilling down into what will This structure is simple enough for anyone to grasp quickly, while also providing
actually be done in implementing ISO 27001, and should include critical project data an effective way of ensuring policies are implemented at each level of the
such as review dates. Additional resources and information may be necessary to organisation.
make sure that the plan is comprehensive and suitably detailed.
A great deal can be said about documentation, but there are two key points:
The risk register should account for risks to the project itself. These might be
budgetary (will the organisation continue to fund the project?), cultural (will staff 1. Documentation should be controlled to ensure the latest versions are
resist the change?), lack of management commitment (will senior management approved and identifiable.
openly support the project?), legal (are there specific legal obligations that might be 2. Documentation should be adequate and not excessive, enabling each
at risk?), and so on. Each risk included in the register should have an assigned owner process to be systematically communicated, understood, executed and
and a mitigation plan, and should be reviewed regularly throughout the project. effective.
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 5
The management framework also needs to set the groundwork for the rest of the Step 6. Risk management
implementation, so you will need to formalise some key arrangements:
Information security risk management is at the heart of the ISMS. On the basis
• The information security policy. of regular risk assessments, your ISMS will adapt to meet new and evolving
• The resources necessary to meet your objectives. challenges, and ensure that the risks to information security are adequately
• Your communication strategy and/or policy (both internal and external and appropriately mitigated. Risk management will need to become a core
communications). competence for any organisation implementing ISO 27001.
• Competence requirements.
The Standard allows the organisation to broadly define its own risk management
processes. Common methods focus on looking at either risks to specific assets or
risks presented by specific scenarios. There are pros and cons to each, which are
discussed in Nine Steps to Success, and some organisations will be considerably
more suited to one method than the other.
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 6
There are five important steps in an ISO 27001 information security risk assessment: The results of risk analysis can be evaluated against your risk acceptance criteria
to determine how you respond to the risk. Generally speaking, there are four
1. Establish a risk assessment framework ways of responding to a risk:
2. Identify risks
3. Analyse risks 1. Tolerate the risk
4. Evaluate risks 2. Treat it by applying controls
5. Select risk management options 3. Terminate the risk by avoiding it entirely
4. Transfer the risk, such as through insurance or agreements with other parties
The risk assessment framework needs a person(s) to be responsible for the risk
assessment. Without someone who is capable of performing the assessment, the For instance, your organisation might decide that anything in the green area
whole exercise will fail. is an acceptable risk; that you will apply controls to anything orange or yellow;
and anything in the red area should be terminated. You might choose to transfer
You will also need to define your risk acceptance criteria, which involves some risks on a case-by-case basis.
understanding your risk appetite and the level of risk that the organisation can
tolerate. The key outputs of an ISO 27001 risk assessment are the Statement of
Applicability (SoA) and the risk treatment plan.
Risk levels are typically calculated as a factor of the impact of a risk and its likelihood.
Risk managers often present this in a simple matrix: The SoA is a document that contains the “necessary controls” you have
selected, justifications for their inclusion, whether or not they have been
implemented, and justification for excluding any controls from Annex A of ISO
27001. It essentially proves that you have done due diligence by considering all
the reference controls, and is especially important if you are seeking to certify
your ISMS.
The risk treatment plan, meanwhile, shows the results of the risk assessment
– that is, for each identified risk that requires treatment, what the organisation
intends to do. This should include other essential information such as
Likelihood
Impact
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 7
The Standard also requires staff, contractors and other types of employee to be Internal audits should be scheduled at planned intervals and should cover the
aware of the information security policy, how they contribute to effective information whole of the ISMS. It should go without saying that internal auditors need to be
security management, and the implications of failing to conform to the requirements competent (which may require specialised training for staff, or outsourcing of
of the ISMS. the task), and that they need to demonstrate impartiality and objectivity when
auditing.
Staff are almost always the organisation’s weakest point, so ensuring they know how
they contribute to information security is critical. Like other processes, your staff Results from ongoing measurement and evaluation, and from internal audits
awareness programme should be systematic and maintained over time. form part of the input for the management review, alongside information about
any nonconformities and corrective actions. The outputs of the review, as
And, of course, all of this will need to be documented. This will fall into the mentioned earlier, will be fed into the continual improvement process, allowing
documentation framework you developed in the initiation phase. the organisation to make corrections and adjustments to the ISMS.
This is a large and highly detailed phase of the whole implementation project; it
would be wise to read up on the process and what will be required in detail.
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 8
Step 9. Certification Management should be fully involved in the certification audit. It may be useful
to rehearse with them the sorts of questions they may be asked, and to review
The final step is, obviously, to have your ISMS examined and certified by an the formal, management-level policies and declarations.
independent external body. There are several certification bodies, and the one you
select should meet a couple of conditions: For many organisations, this will be one of the most critical stages: proving that
the implementation programme was effective and being able to show that to
• They should be accredited by your national accreditation body, which should be partners, customers and other stakeholders. To maximise your chances of getting
a member of the International Accreditation Forum (IAF). to this stage, read Nine Steps to Success.
• They should have an approach to assessment that takes each organisation’s
circumstances into account. An ISMS is unique to its organisation, and the
certification audit, therefore, should not simply be a mechanical comparison of
the ISMS against the Standard.
The certification audit will determine whether the ISMS is worthy of certification.
There are several things you can do to maximise the likelihood of passing
certification at the first attempt.
Ensure that you have records of internal audits, process and control operation, and
testing. These provide evidence that your ISMS is an active management system
rather than just a set of documents, and may also demonstrate your corrective
actions and continual improvement in action.
Make sure your staff are open and honest with the auditors, and that they know how
to answer the auditors’ questions. This should include ensuring appropriate staff
have a thorough knowledge of the areas of information security they are responsible
for.
IT GOVERNANCE | GREEN PAPER SEPTEMBER 2019 9
Cyber Security - An issue for the board Risk Assessment and ISO 27001
IT GOVERNANCE | GREEN PAPER SEPTEMBER 2019 10
Training
Useful ISMS resources
ISO 27001 Certified ISMS Lead Implementer Training Course
IT Governance offers a unique range of information security products and services, If you are involved in information security management, Classroom
including books, standards, pocket guides, training courses and professional writing information security policies or implementing ISO ACCREDITED
planning/implementation team – this course covers all the key ISO 17024:2012 certificated and IISP accredited
ISO 27001
Standards steps in preparing for and achieving ISMS certification first Certified ISMS Lead
Implementer Training Course
INTERNATIONAL STANDARD
time. Also available as a Live Online course.
ISO 27001 ISMS Requirements
ISO/IEC 27001:2013
ISO/IEC 27001:2013, usually referred to just as ISO 27001,
Information technology — Security
is the best-practice specification that helps businesses and techniques — Information security
management systems —
Software
organisations throughout the world to develop an ISMS Requirements
Books Fully aligned with ISO 27001, vsRisk Cloud streamlines the
risk assessment process and helps you produce robust risk
Nine Steps to Success – An ISO 27001:2013 assessments. The software tool saves 80% of your time and
Implementation Overview significantly cuts the consultancy costs that are typically
associated with tackling a risk assessment. vsRISK
Now in its third edition, this must-have guide has been CLOUD
completely updated to align with IT Governance’s
implementation methodology, used by our consultants in
hundreds of successful ISMS implementations around the
world.
Toolkits
IT Governance solutions
Toolkits Consultancy
Our unique documentation toolkits are designed to help organisations adapt quickly We are an acknowledged world leader in our field. Our experienced consultants,
and adopt best practice using customisable template policies, procedures, forms with multi-sector and multi-standard knowledge and experience, can help you
and records. accelerate your IT GRC projects.
Visit www.itgovernance.co.uk/documentation-toolkits to view and trial all of our Visit www.itgovernance.co.uk/consulting for more information.
available toolkits.
Software
Our industry-leading software tools, developed with your needs and requirements in
mind, make information security risk management straightforward and affordable for
all, enabling organisations worldwide to be ISO 27001-compliant.
Europe USA
IT Governance Europe Ltd, Third Floor IT Governance USA Inc.
The Boyne Tower Bull Ring, Lagvooren, Drogheda 420 Lexington Avenue, Suite 300
Co. Louth, A92 F682, Ireland New York, NY 10170, USA
@ITGovernanceEU
@ITG_USA
/it-governance-europe-ltd
/it-governance-usa-inc
/ITGovernanceEU /ITGovernanceUSA
IT Governance Ltd | Company registration number: 4418178 | VAT number: GB 927 5935 83