0% found this document useful (0 votes)
177 views12 pages

Implementing ISMS 9 Steps Aug 19

This document outlines a nine-step approach to implementing an ISO 27001 compliant Information Security Management System (ISMS). The steps include: 1) establishing a project mandate with management support and defining objectives, timelines and costs; 2) initiating the project by setting up governance structures and more granular security objectives; 3) initiating the ISMS by establishing documentation structures and selecting a continual improvement methodology. The approach aims to systematically implement people, process and technology measures to protect information security in line with the ISO 27001 standard.

Uploaded by

Sudhanshu Sinha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
177 views12 pages

Implementing ISMS 9 Steps Aug 19

This document outlines a nine-step approach to implementing an ISO 27001 compliant Information Security Management System (ISMS). The steps include: 1) establishing a project mandate with management support and defining objectives, timelines and costs; 2) initiating the project by setting up governance structures and more granular security objectives; 3) initiating the ISMS by establishing documentation structures and selecting a continual improvement methodology. The approach aims to systematically implement people, process and technology measures to protect information security in line with the ISO 27001 standard.

Uploaded by

Sudhanshu Sinha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

IT GOVERNANCE | GREEN PAPER

Implementing an ISMS
The nine-step approach

Protect Comply Thrive


IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 2

Introduction Implementation is a project


While many organisations develop a range of security measures as they grow, and
Information security is not just about antivirus software, implementing the latest many of those measures are effective, these information security regimes are often
firewall or locking down your laptops and web servers – it is just as much about disjointed, and gaps will inevitably be discovered – either by the organisation or
addressing risks without compromising your business objectives. Because of by its enemies.
this, the overall approach to information security should be strategic as well as
operational. Developing a comprehensive, effective ISMS to secure your organisation’s
information assets is almost inevitably a large undertaking. It will require the
An information security management system (ISMS) is a systematic approach to organisation to treat it as a major project, with all of the associated trappings,
managing confidential or sensitive company information so that it remains secure. such as securing management commitment, defining project governance, setting
outcomes and timescales, and ensuring adequate resources are available and
The fact that it is systematic is possibly the most important facet of an ISMS: earmarked.
it protects the organisation’s information by ensuring consistent, effective
behaviours. If an organisation knows how it needs to operate in order to keep
information secure, creating a system to ensure this happens is a key to success.

For an organisation to secure its information, it must approach the task from the
perspectives of people, processes and technologies. These are interlinked. In the
simplest sense, a technology needs a person to manage and maintain it, and that
person needs to follow defined processes in doing so.

This is part of the systematisation of information security: ensuring full coverage at


any point that information could be compromised.
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 3

Nine steps Step 1. Project mandate


The first, obvious step is to start. Starting any project is a critical phase succinctly
The IT Governance nine-step approach to implementing an ISO 27001-compliant explained with a cliché: well begun is half done.
ISMS takes all of this into account, and reflects the methodology used by our
consultants in hundreds of successful ISMS implementations around the world. The project leader will, at least initially, be the person who takes the initiative and
begins the push for the ISMS. They will be the person to whom everyone else in
This paper cannot possibly cover all the possible issues you might encounter, or the organisation looks for information and guidance on the project.
spell out every incremental step, but it does describe what we consider the essential
implementation process. The project mandate itself is essentially a set of answers to the questions all
projects face in their early stages:
The nine steps cover the full extent of the project, from initial discussions with
managers through to testing the completed project. It is as much about 2
having the • What are we hoping to achieve?
board on your side as it is about implementing security controls. • How long will it take?
• What will it cost?
It is important to remember that this process is not exhaustive. Each organisation • Does it have management support?
will come up against its own set of stumbling blocks and will need to consult other
sources of information. The last of these is proof that the first three have been clearly answered, and it is
absolutely essential. Success depends entirely on the project having real support
While this approach is focused on achieving accredited certification, this is not from the top of the organisation.
strictly necessary for an organisation to get significant value from its ISMS. To realise
maximum value, however – such as from improved business opportunities, simpler Developing the answers to these questions may involve a lot of research and
compliance with legal and regulatory requirements, and so on – certification should preparation – gap analyses, budgeting, reviewing case studies, and so on. This is
certainly be a consideration. time well spent, though, because a failure to adequately prepare will likely mean
that you will be unable to meet your objectives.
The nine-step process is described in more detail in Nine Steps to Success – An
ISO27001:2013 Implementation Overview. A deliverable for this step will be a set of documents laying out the project.

A project initiation document (PID) would be an ideal format for the mandate to
take.
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 4

Step 2. Project initiation Step 3. ISMS initiation


With the mandate in place, the next step is to set up the project and the project ISO 27000 (the overview for the ISO information security management
governance structure, as described in Nine Steps to Success. This is essentially an standards) recognises that a “process approach” to continual improvement
extension of what is contained in the PID, comprising: is the most effective model for managing information security. That is, each
process has a set of inputs and outputs, and the outputs may become inputs
• Information security objectives; for further processes. In a broad sense, this can be cyclical, as in continual
• The project team; improvement methodologies such as PDCA (Plan-Do-Check-Act).
• A project plan; and
• A project risk register. ISO 27001 does not specify a particular continual improvement methodology,
preferring instead to allow organisations to use whatever method they choose,
The information security objectives are more granular and specific than the project or to use a model they already have in place. If your organisation does not yet
objectives set in the previous step. They will feed into the information security policy have a preferred methodology, Nine Steps to Success discusses the merits of
and really shape how the ISMS is applied. Because these are ‘policy-level’ objectives, each of the most popular models.
they should include a time-bound statement about whether the organisation is
seeking certification or just compliance with the Standard. As part of the ISMS initiation, you will need to establish your documentation
structure. We recommend a four-tier approach:
The project team should represent the interests of every part of the organisation
and various levels of seniority. You should also draw up a RACI matrix at this point, 1. Policies at the very top, defining the organisation’s position and
identifying who is responsible, accountable, consulted and informed regarding the requirements.
key decisions relating to the project. 2. Procedures to enact the policies’ requirements.
3. Work instructions describing the detail for the employees who enact
A key role is that of the information security manager. In addition to having a central elements of the procedures.
role in the implementation project, they will eventually be responsible for the day-to- 4. Records tracking the procedures and work instructions, providing evidence
day functioning of the ISMS. that they have been followed correctly and consistently.

The project plan is part of the process of gradually drilling down into what will This structure is simple enough for anyone to grasp quickly, while also providing
actually be done in implementing ISO 27001, and should include critical project data an effective way of ensuring policies are implemented at each level of the
such as review dates. Additional resources and information may be necessary to organisation.
make sure that the plan is comprehensive and suitably detailed.
A great deal can be said about documentation, but there are two key points:
The risk register should account for risks to the project itself. These might be
budgetary (will the organisation continue to fund the project?), cultural (will staff 1. Documentation should be controlled to ensure the latest versions are
resist the change?), lack of management commitment (will senior management approved and identifiable.
openly support the project?), legal (are there specific legal obligations that might be 2. Documentation should be adequate and not excessive, enabling each
at risk?), and so on. Each risk included in the register should have an assigned owner process to be systematically communicated, understood, executed and
and a mitigation plan, and should be reviewed regularly throughout the project. effective.
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 5

Step 4. Management framework Step 5. Baseline security criteria


At this stage, the ISMS needs a broader sense of the actual framework. ISO 27001 The baseline security criteria are the core security requirements that the
addresses this in Clauses 4 and 5, requiring the organisation to define the context organisation has identified. These are the requirements and corresponding
for the ISMS, and the roles that the organisation’s leadership plays. measures or controls that the organisation must have in place to do business.
For example, a business may have a legal requirement to retain certain records;
The context of the organisation is really about identifying the range of interests that another organisation may be contractually obliged to provide a minimum level of
need to be taken into account. The organisation, clearly, has interests in information security to a key customer’s information assets.
security, as do clients, partners, legal and regulatory authorities, and so on. You
began examining these interests with the risk register in step 2. This step is generally straightforward, because it operates on the basis that you
have already done much of this work. You need only identify the practices you
As you might gather, this phase is especially important as it defines what the ISMS already have in place, assess their effectiveness, and ensure that they continue
will eventually become. From this perspective, it is obviously important
2 that you under the control of the eventual ISMS – potentially in an improved state.
recognise all relevant interests so that the ISMS can meet your organisation’s needs.
You should, of course, ensure that you are currently meeting your obligations.
Part of this will involve identifying the scope of the ISMS, which will heavily depend Tools and databases exist that track legal requirements for information security
on the context. The scope also needs to ensure it takes into account mobile devices (such as Vigilant Software’s Compliance Manager), and you should ensure that
and teleworkers – the organisation’s logical perimeter that might be mobile, and this process covers all the necessary jurisdictions.
might include devices that employees own.

The management framework also needs to set the groundwork for the rest of the Step 6. Risk management
implementation, so you will need to formalise some key arrangements:
Information security risk management is at the heart of the ISMS. On the basis
• The information security policy. of regular risk assessments, your ISMS will adapt to meet new and evolving
• The resources necessary to meet your objectives. challenges, and ensure that the risks to information security are adequately
• Your communication strategy and/or policy (both internal and external and appropriately mitigated. Risk management will need to become a core
communications). competence for any organisation implementing ISO 27001.
• Competence requirements.
The Standard allows the organisation to broadly define its own risk management
processes. Common methods focus on looking at either risks to specific assets or
risks presented by specific scenarios. There are pros and cons to each, which are
discussed in Nine Steps to Success, and some organisations will be considerably
more suited to one method than the other.
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 6

There are five important steps in an ISO 27001 information security risk assessment: The results of risk analysis can be evaluated against your risk acceptance criteria
to determine how you respond to the risk. Generally speaking, there are four
1. Establish a risk assessment framework ways of responding to a risk:
2. Identify risks
3. Analyse risks 1. Tolerate the risk
4. Evaluate risks 2. Treat it by applying controls
5. Select risk management options 3. Terminate the risk by avoiding it entirely
4. Transfer the risk, such as through insurance or agreements with other parties
The risk assessment framework needs a person(s) to be responsible for the risk
assessment. Without someone who is capable of performing the assessment, the For instance, your organisation might decide that anything in the green area
whole exercise will fail. is an acceptable risk; that you will apply controls to anything orange or yellow;
and anything in the red area should be terminated. You might choose to transfer
You will also need to define your risk acceptance criteria, which involves some risks on a case-by-case basis.
understanding your risk appetite and the level of risk that the organisation can
tolerate. The key outputs of an ISO 27001 risk assessment are the Statement of
Applicability (SoA) and the risk treatment plan.
Risk levels are typically calculated as a factor of the impact of a risk and its likelihood.
Risk managers often present this in a simple matrix: The SoA is a document that contains the “necessary controls” you have
selected, justifications for their inclusion, whether or not they have been
implemented, and justification for excluding any controls from Annex A of ISO
27001. It essentially proves that you have done due diligence by considering all
the reference controls, and is especially important if you are seeking to certify
your ISMS.

The risk treatment plan, meanwhile, shows the results of the risk assessment
– that is, for each identified risk that requires treatment, what the organisation
intends to do. This should include other essential information such as
Likelihood

responsibility for the risk and deadlines for completion.

Impact
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 7

Step 7. Implementation Step 8. Measure, monitor and review


While we call this the ‘implementation’ phase, what we really refer to is the For the ISMS to be effective, it must meet its information security objectives.
implementation of the management system processes and the risk treatment plan. To know whether it is doing so, you need to measure, monitor and review its
This is the process of building the actual processes and security controls that will performance.
protect your organisation’s information assets.
ISO 27001 requires the organisation to establish a series of processes that feed
In order to ensure these are completely effective, you will need to make sure that into the continual improvement cycle (established in step 3 – ISMS initiation):
staff are appropriately competent to operate or interact with the controls, and that
they are aware of their information security obligations. • Monitoring, measurement, analysis and evaluation
• Internal audit
You will need to develop a process to manage the competences necessary to • Management review
achieve your ISMS objectives. Competence should take into account2 not only the
specific skills and knowledge needed for the relevant controls but also a strong You will need to identify metrics or other methods of gauging the effectiveness
understanding of ISO 27001 and how the ISMS should operate. A small number of and implementation of your processes and controls. Remember that you should
staff may need to acquire appropriate qualifications, focusing particularly on areas not just be looking at the results, but also at elements like how often a control
such as implementing and auditing information security, risk management, business is used. The results should then be analysed and evaluated to determine how
continuity, and so on. effective the control actually is.

The Standard also requires staff, contractors and other types of employee to be Internal audits should be scheduled at planned intervals and should cover the
aware of the information security policy, how they contribute to effective information whole of the ISMS. It should go without saying that internal auditors need to be
security management, and the implications of failing to conform to the requirements competent (which may require specialised training for staff, or outsourcing of
of the ISMS. the task), and that they need to demonstrate impartiality and objectivity when
auditing.
Staff are almost always the organisation’s weakest point, so ensuring they know how
they contribute to information security is critical. Like other processes, your staff Results from ongoing measurement and evaluation, and from internal audits
awareness programme should be systematic and maintained over time. form part of the input for the management review, alongside information about
any nonconformities and corrective actions. The outputs of the review, as
And, of course, all of this will need to be documented. This will fall into the mentioned earlier, will be fed into the continual improvement process, allowing
documentation framework you developed in the initiation phase. the organisation to make corrections and adjustments to the ISMS.

This is a large and highly detailed phase of the whole implementation project; it
would be wise to read up on the process and what will be required in detail.
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 8

Step 9. Certification Management should be fully involved in the certification audit. It may be useful
to rehearse with them the sorts of questions they may be asked, and to review
The final step is, obviously, to have your ISMS examined and certified by an the formal, management-level policies and declarations.
independent external body. There are several certification bodies, and the one you
select should meet a couple of conditions: For many organisations, this will be one of the most critical stages: proving that
the implementation programme was effective and being able to show that to
• They should be accredited by your national accreditation body, which should be partners, customers and other stakeholders. To maximise your chances of getting
a member of the International Accreditation Forum (IAF). to this stage, read Nine Steps to Success.
• They should have an approach to assessment that takes each organisation’s
circumstances into account. An ISMS is unique to its organisation, and the
certification audit, therefore, should not simply be a mechanical comparison of
the ISMS against the Standard.

If you already have a certified management system, such as a quality or business


continuity management systems (QMS, BCMS) based on an ISO standard, you Speak to an expert
should consider the value of an integrated certification service to minimise
disruption and costs.

The certification audit will determine whether the ISMS is worthy of certification.
There are several things you can do to maximise the likelihood of passing
certification at the first attempt.

Ensure your documentation is complete, comprehensive and available for the


auditors to inspect. This should be in place before the actual certification audit, as
the auditors may want to review your documentation before the visit.

Ensure that you have records of internal audits, process and control operation, and
testing. These provide evidence that your ISMS is an active management system
rather than just a set of documents, and may also demonstrate your corrective
actions and continual improvement in action.

Make sure your staff are open and honest with the auditors, and that they know how
to answer the auditors’ questions. This should include ensuring appropriate staff
have a thorough knowledge of the areas of information security they are responsible
for.
IT GOVERNANCE | GREEN PAPER SEPTEMBER 2019 9

Other papers you may be interested in

Cyber Security - An issue for the board Risk Assessment and ISO 27001
IT GOVERNANCE | GREEN PAPER SEPTEMBER 2019 10

Training
Useful ISMS resources
ISO 27001 Certified ISMS Lead Implementer Training Course

IT Governance offers a unique range of information security products and services, If you are involved in information security management, Classroom
including books, standards, pocket guides, training courses and professional writing information security policies or implementing ISO ACCREDITED

consultancy services. 27001 – either as a Lead Implementer, or as part of the CIS LI

planning/implementation team – this course covers all the key ISO 17024:2012 certificated and IISP accredited

ISO 27001
Standards steps in preparing for and achieving ISMS certification first Certified ISMS Lead
Implementer Training Course
INTERNATIONAL STANDARD
time. Also available as a Live Online course.
ISO 27001 ISMS Requirements

ISO/IEC 27001:2013
ISO/IEC 27001:2013, usually referred to just as ISO 27001,
Information technology — Security
is the best-practice specification that helps businesses and techniques — Information security
management systems —
Software
organisations throughout the world to develop an ISMS Requirements

vsRisk Cloud – the definitive ISO 27001 risk assessment tool

Books Fully aligned with ISO 27001, vsRisk Cloud streamlines the
risk assessment process and helps you produce robust risk
Nine Steps to Success – An ISO 27001:2013 assessments. The software tool saves 80% of your time and
Implementation Overview significantly cuts the consultancy costs that are typically
associated with tackling a risk assessment. vsRISK
Now in its third edition, this must-have guide has been CLOUD
completely updated to align with IT Governance’s
implementation methodology, used by our consultants in
hundreds of successful ISMS implementations around the
world.

Toolkits

ISO 27001 ISMS Documentation Toolkit

Fulfil your ISO 27001 documentation obligations with


customisable templates and implementation guidance
from ISO 27001 auditors. Ensure total coverage of your
project with this complete set of mandatory and supporting
documentation.
IT GOVERNANCE | GREEN PAPER SEPTEMBER 2019 11

IT Governance solutions

IT Governance writes and publishes extensively on cyber security and IT


governance, risk management and compliance (GRC) subjects, and has developed
Training
a range of tools for IT governance, information security and regulatory compliance
We offer training courses from staff awareness and foundation courses, through
practitioners.
to advanced programmes for IT practitioners and certified lead implementers and
auditors.
Books
We sell sought-after publications covering all areas of corporate and IT governance. Our training team organises and runs in-house and public training courses all year
Our publishing team also manages a growing collection of titles that provide round, as well as Live Online and distance-learning classes, covering a growing
practical advice for staff taking part in IT governance projects, suitable for all levels number of IT governance topics.
of knowledge, responsibility and experience.
Visit www.itgovernance.co.uk/iso27001-information-security-training for more
Visit www.itgovernance.co.uk/shop/category/itgp-books to view our full catalogue.. information.

Toolkits Consultancy
Our unique documentation toolkits are designed to help organisations adapt quickly We are an acknowledged world leader in our field. Our experienced consultants,
and adopt best practice using customisable template policies, procedures, forms with multi-sector and multi-standard knowledge and experience, can help you
and records. accelerate your IT GRC projects.

Visit www.itgovernance.co.uk/documentation-toolkits to view and trial all of our Visit www.itgovernance.co.uk/consulting for more information.
available toolkits.

Software
Our industry-leading software tools, developed with your needs and requirements in
mind, make information security risk management straightforward and affordable for
all, enabling organisations worldwide to be ISO 27001-compliant.

Visit www.itgovernance.co.uk/shop/category/software for more information.


United Kingdom
Unit 3, Clive Court, Bartholomew’s Walk t: +44 (0)333 800 7000
Cambridgeshire Business Park, Ely e: [email protected]
Cambs., CB7 4EA, United Kingdom w: www.itgovernance.co.uk

@ITGovernance /it-governance /ITGovernanceLtd

Europe USA
IT Governance Europe Ltd, Third Floor IT Governance USA Inc.
The Boyne Tower Bull Ring, Lagvooren, Drogheda 420 Lexington Avenue, Suite 300
Co. Louth, A92 F682, Ireland New York, NY 10170, USA

t: +353 (0) 1 695 0411 t: +1 877 317 3454


e: [email protected] e: [email protected]
w: www.itgovernance.eu w: www.itgovernanceusa.com

@ITGovernanceEU
@ITG_USA
/it-governance-europe-ltd
/it-governance-usa-inc

/ITGovernanceEU /ITGovernanceUSA

IT Governance Ltd | Company registration number: 4418178 | VAT number: GB 927 5935 83

You might also like