What Is The Meaning of ISO 27001?
What Is The Meaning of ISO 27001?
First, it is important to note that the full name of ISO 27001 is “ISO/IEC 27001 – Information
technology — Security techniques — Information security management systems —
Requirements.”
It is the leading international standard focused on information security, published by the
International Organization for Standardization (ISO), in partnership with the International
Electrotechnical Commission (IEC). Both are leading international organizations that develop
international standards.
ISO-27001 is part of a set of standards developed to handle information security: the ISO/IEC
27000 series.
Individuals can also get ISO 27001-certified by attending a course and passing the exam and, in
this way, prove their skills to potential employers.
Because it is an international standard, ISO 27001 is easily recognized all around the world,
increasing business opportunities for organizations and professionals.
• • Confidentiality: only the authorized persons have the right to access information.
• • Integrity: only the authorized persons can change the information.
• • Availability: the information must be accessible to authorized persons whenever it is
needed.
What is an ISMS?
An Information Security Management System (ISMS) is a set of rules that a company needs to
establish in order to:
Comply with legal requirements – there is an ever-increasing number of laws, regulations, and
contractual requirements related to information security, and the good news is that most of them
can be resolved by implementing ISO 27001 – this standard gives you the perfect methodology to
comply with them all.
Achieve competitive advantage – if your company gets certified and your competitors do not,
you may have an advantage over them in the eyes of those customers who are sensitive about
keeping their information safe.
Lower costs – the main philosophy of ISO 27001 is to prevent security incidents from happening
– and every incident, large or small, costs money. Therefore, by preventing them, your company
will save quite a lot of money. And the best thing of all – investment in ISO 27001 is far smaller
than the cost savings you’ll achieve.
Better organization – typically, fast-growing companies don’t have the time to stop and define
their processes and procedures – as a consequence, very often the employees do not know what
needs to be done, when, and by whom. Implementation of ISO 27001 helps resolve such
situations, because it encourages companies to write down their main processes (even those that
are not security-related), enabling them to reduce lost time by their employees.
How does ISO 27001 work?
The focus of ISO 27001 is to protect the confidentiality, integrity, and availability of the
information in a company. This is done by finding out what potential problems could happen to
the information (i.e., risk assessment), and then defining what needs to be done to prevent such
problems from happening (i.e., risk mitigation or risk treatment).
Therefore, the main philosophy of ISO 27001 is based on a process for managing risks: find out
where the risks are, and then systematically treat them, through the implementation of security
controls (or safeguards). ISO 27001 requires a company to list all controls that are to be
implemented in a document called the Statement of Applicability.
Clause 4: Context of the organization – defines requirements for understanding external and
internal issues, interested parties and their requirements, and defining the ISMS scope.
Clause 5: Leadership – defines top management responsibilities, setting the roles and
responsibilities, and contents of the top-level Information Security Policy.
Clause 6: Planning – defines requirements for risk assessment, risk treatment, Statement of
Applicability, risk treatment plan, and setting the information security objectives.
Clause 7: Support – defines requirements for availability of resources, competencies, awareness,
communication, and control of documents and records.
Clause 8: Operation – defines the implementation of risk assessment and treatment, as well as
controls and other processes needed to achieve information security objectives.
Clause 9: Performance evaluation – defines requirements for monitoring, measurement,
analysis, evaluation, internal audit, and management review.
Clause 10: Improvement – defines requirements for nonconformities, corrections, corrective
actions, and continual improvement.
What are the 14 domains of ISO 27001?
There are 14 “domains” listed in Annex A of ISO 27001, organized in sections A.5 to A.18. The
sections cover the following:
A.5. Information security policies: The controls in this section describe how to handle
information security policies.
A.6. Organization of information security: The controls in this section provide the basic
framework for the implementation and operation of information security by defining its internal
organization (e.g., roles, responsibilities, etc.), and through the organizational aspects of
information security, like project management, use of mobile devices, and teleworking.
A.7. Human resource security: The controls in this section ensure that people who are under the
organization’s control are hired, trained, and managed in a secure way; also, the principles of
disciplinary action and terminating the agreements are addressed.
A.8. Asset management: The controls in this section ensure that information security assets (e.g.,
information, processing devices, storage devices, etc.) are identified, that responsibilities for their
security are designated, and that people know how to handle them according to predefined
classification levels.
A.9. Access control: The controls in this section limit access to information and information
assets according to real business needs. The controls are for both physical and logical access.
A.10. Cryptography: The controls in this section provide the basis for proper use of encryption
solutions to protect the confidentiality, authenticity, and/or integrity of information.
A.11. Physical and environmental security: The controls in this section prevent unauthorized
access to physical areas, and protect equipment and facilities from being compromised by human
or natural intervention.
A.12. Operations security: The controls in this section ensure that the IT systems, including
operating systems and software, are secure and protected against data loss. Additionally, controls
in this section require the means to record events and generate evidence, periodic verification of
vulnerabilities, and make precautions to prevent audit activities from affecting operations.
A.13. Communications security: The controls in this section protect the network infrastructure
and services, as well as the information that travels through them.
A.14. System acquisition, development and maintenance: The controls in this section ensure that
information security is taken into account when purchasing new information systems or
upgrading the existing ones.
A.15. Supplier relationships: The controls in this section ensure that outsourced activities
performed by suppliers and partners also use appropriate information security controls, and they
describe how to monitor third-party security performance.
A.16. Information security incident management: The controls in this section provide a
framework to ensure the proper communication and handling of security events and incidents, so
that they can be resolved in a timely manner; they also define how to preserve evidence, as well
as how to learn from incidents to prevent their recurrence.
A.17. Information security aspects of business continuity management: The controls in this
section ensure the continuity of information security management during disruptions, and the
availability of information systems.
A.18. Compliance: The controls in this section provide a framework to prevent legal, statutory,
regulatory, and contractual breaches, and audit whether information security is implemented and
is effective according to the defined policies, procedures, and requirements of the ISO 27001
standard.
A closer look at these domains shows us that managing information security is not only about IT
security (i.e., firewalls, anti-virus, etc.), but also about managing processes, legal protection,
managing human resources, physical protection, etc.
To see a more detailed explanation of each of these documents, download the free white
paper Checklist of Mandatory Documentation Required by ISO 27001 (2013 Revision).
What is “ISO 27001 certified”?
A company can go for ISO 27001 certification by inviting an accredited certification body to
perform the certification audit and, if the audit is successful, to issue the ISO 27001 certificate to
the company. This certificate will mean that the company is fully compliant with the ISO 27001
standard.
An individual can go for ISO 27001 certification by going through ISO 27001 training and
passing the exam. This certificate will mean that this person has acquired the appropriate skills
during the course.
ISO/IEC 27000 provides terms and definitions used in the ISO 27k series of standards.
ISO/IEC 27002 provides guidelines for the implementation of controls listed in ISO 27001
Annex A. It can be quite useful, because it provides details on how to implement these controls.
ISO/IEC 27004 provides guidelines for the measurement of information security – it fits well
with ISO 27001, because it explains how to determine whether the ISMS has achieved its
objectives.
ISO/IEC 27005 provides guidelines for information security risk management. It is a very good
supplement to ISO 27001, because it gives details on how to perform risk assessment and risk
treatment, probably the most difficult stage in the implementation.
ISO/IEC 27017 provides guidelines for information security in cloud environments.
ISO/IEC 27018 provides guidelines for the protection of privacy in cloud environments.
ISO/IEC 27031 provides guidelines on what to consider when developing business continuity for
Information and Communication Technologies (ICT). This standard is a great link between
information security and business continuity practices.
The first version of ISO 27001 was released in 2005 (ISO/IEC 27001:2005), the second version
in 2013, and the standard was last reviewed in 2019, when the 2013 version was confirmed (i.e.,
no changes were needed).
It is important to note that different countries that are members of ISO can translate the standard
into their own languages, making minor additions (e.g., national forewords) that do not affect the
content of the international version of the standard. These “versions” have additional letters to
differentiate them from the international standard, e.g., NBR ISO/IEC 27001 designates the
“Brazilian version,” while BS ISO/IEC 27001 designates the “British version.” These local
versions of the standard also contain the year when they were adopted by the local
standardization body, so the latest British version is BS EN ISO/IEC 27001:2017, meaning that
ISO/IEC 27001:2013 was adopted by the British Standards Institution in 2017.
In other words, for each control, ISO 27001 provides only a brief description, while ISO 27002
provides detailed guidance.
Although they are not the same, the NIST SP 800 series and ISO 27001 can be used together for
implementation of information security.
Is ISO 27001 mandatory?
In most countries, implementation of ISO 27001 is not mandatory. However, some countries have
published regulations that require certain industries to implement ISO 27001.
To determine whether ISO 27001 is mandatory or not for your company, you should look for
expert legal advice in the country where you operate.
75 employees
Has a control environment that, while previously subject to external review, would
still be best referred to as immature and non-fully documented; i.e., a Capability Maturity
Model (CMM) of 2
Has a “CSO” that is very technical but is not well versed in ISO 27001/ISO 27002 (i.e.,
a CISSP rather than a CISA or CISM)
Is experiencing pressure from clients for third party attestation – often specifically
asking for ISO 27001 certification
Require a fair degree of ISO-27001 consulting to prep for the certification audit
Assuming the above more or less holds true, the “external” costs to become ISO 27001
certified may look as follows:
A word of caution – your costs may vary notably. We have clients that have spent as
little as $5,000 and as much as $70,000 on pre-certification consulting. As an FYI, I used
$1,500 per man-day in my estimates, as I have seen rates anywhere between $1,400 and
$1,800 for a “true” ISO-27001 consultant.