Implementing An ISMS: The Nine-Step Approach
Implementing An ISMS: The Nine-Step Approach
Implementing an ISMS
For an organisation to secure its information, it must approach the task from the It is important to remember that this process is not exhaustive. Each organisation
perspectives of people, processes and technologies. These are interlinked. In the will come up against its own set of stumbling blocks and will need to consult other
simplest sense, a technology needs a person to manage and maintain it, and that sources of information.
person needs to follow defined processes in doing so. This is part of the
systematisation of information security: ensuring full coverage at any point that While this approach is focused on achieving accredited certification, this is not
information could be compromised. strictly necessary for an organisation to get significant value from its ISMS. To
realise maximum value, however – such as from improved business opportunities,
Implementation is a project simpler compliance with legal and regulatory requirements, and so on –
certification should certainly be a consideration.
While many organisations develop a range of security measures as they grow, and many
The nine-step process is described in more detail in Nine Steps to Success – An
of those measures are effective, these information security regimes are often disjointed,
ISO27001:2013 Implementation Overview.
and gaps will inevitably be discovered – either by the organisation or by its enemies.
The project leader will, at least initially, be the person who takes the initiative
and begins the push for the ISMS. They will be the person to whom everyone
else in the organisation looks for information and guidance on the project.
The project mandate itself is essentially a set of answers to the questions all
projects face in their early stages:
The last of these is proof that the first three have been clearly answered, and it
is absolutely essential. Success depends entirely on the project having real
support from the top of the organisation.
Developing the answers to these questions may involve a lot of research and
preparation – gap analyses, budgeting, reviewing case studies, and so on. This is
time well spent, though, because a failure to adequately prepare will likely mean
that you will be unable to meet your objectives.
A deliverable for this step will be a set of documents laying out the project.
A project initiation document (PID) would be an ideal format for the mandate to
take.
IT GOVERNANCE GREEN PAPER | AUGUST 2019 4
The information security objectives are more granular and specific than the project The risk register should account for risks to the project itself. These might be
objectives set in the previous step. They will feed into the information security policy budgetary (will the organisation continue to fund the project?), cultural (will staff
and really shape how the ISMS is applied. Because these are ‘policy-level’ objectives, resist the change?), lack of management commitment (will senior management
they should include a time-bound statement about whether the organisation is openly support the project?), legal (are there specific legal obligations that might be at
seeking certification or just compliance with the Standard. risk?), and so on. Each risk included in the register should have an assigned owner and
a mitigation plan, and should be reviewed regularly throughout the project.
The project team should represent the interests of every part of the organisation and
various levels of seniority. You should also draw up a RACI matrix at this point,
identifying who is responsible, accountable, consulted and informed regarding the key
decisions relating to the project.
IT GOVERNANCE GREEN PAPER | AUGUST 2019 5
You should, of course, ensure that you are currently meeting your obligations. Tools There are five important steps in an ISO 27001 information security risk assessment:
and databases exist that track legal requirements for information security (such as
1. Establish a risk assessment framework
Vigilant Software’s Compliance Manager), and you should ensure that this process
covers all the necessary jurisdictions. 2. Identify risks
3. Analyse risks
4. Evaluate risks
5. Select risk management options
The risk assessment framework needs a person(s) to be responsible for the risk
assessment. Without someone who is capable of performing the assessment, the
whole exercise will fail.
You will also need to define your risk acceptance criteria, which involves
understanding your risk appetite and the level of risk that the organisation can
tolerate.
IT GOVERNANCE GREEN PAPER | AUGUST 2019 7
Risk levels are typically calculated as a factor of the impact of a risk and its likelihood. The key outputs of an ISO 27001 risk assessment are the Statement of Applicability
Risk managers often present this in a simple matrix: (SoA) and the risk treatment plan.
Figure 1: Simple risk matrix
The SoA is a document that contains the “necessary controls” you have selected,
justifications for their inclusion, whether or not they have been implemented, and
justification for excluding any controls from Annex A of ISO 27001. It essentially
proves that you have done due diligence by considering all the reference controls, and
is especially important if you are seeking to certify your ISMS.
Impact
The risk treatment plan, meanwhile, shows the results of the risk assessment – that is,
for each identified risk that requires treatment, what the organisation intends to do.
This should include other essential information such as responsibility for the risk and
deadlines for completion.
Likelihood
The results of risk analysis can be evaluated against your risk acceptance criteria to
determine how you respond to the risk. Generally speaking, there are four ways of
responding to a risk:
For instance, your organisation might decide that anything in the green area is an
acceptable risk; that you will apply controls to anything orange or yellow; and
anything in the red area should be terminated. You might choose to transfer some
risks on a case-by-case basis.
IT GOVERNANCE GREEN PAPER | AUGUST 2019 8
This is a large and highly detailed phase of the whole implementation project; it would
be wise to read up on the process and what will be required in detail.
IT GOVERNANCE GREEN PAPER | AUGUST 2019 9
Step 9: Certification
The final step is, obviously, to have your ISMS examined and certified by an Make sure your staff are open and honest with the auditors, and that they know how
independent external body. There are several certification bodies, and the one you to answer the auditors’ questions. This should include ensuring appropriate staff have
select should meet a couple of conditions: a thorough knowledge of the areas of information security they are responsible for.
Management should be fully involved in the certification audit. It may be useful to
• They should be accredited by your national accreditation body, which should be
rehearse with them the sorts of questions they may be asked, and to review the
a member of the International Accreditation Forum (IAF).
formal, management-level policies and declarations.
• They should have an approach to assessment that takes each organisation’s
circumstances into account. An ISMS is unique to its organisation, and the For many organisations, this will be one of the most critical stages: proving that the
certification audit, therefore, should not simply be a mechanical comparison of implementation programme was effective and being able to show that to partners,
the ISMS against the Standard. customers and other stakeholders. To maximise your chances of getting to this stage,
read Nine Steps to Success.
If you already have a certified management system, such as a quality or business
continuity management systems (QMS, BCMS) based on an ISO standard, you should
consider the value of an integrated certification service to minimise disruption and
costs.
The certification audit will determine whether the ISMS is worthy of certification.
There are several things you can do to maximise the likelihood of passing certification
at the first attempt.
Ensure your documentation is complete, comprehensive and available for the auditors
to inspect. This should be in place before the actual certification audit, as the auditors
may want to review your documentation before the visit.
Ensure that you have records of internal audits, process and control operation, and
testing. These provide evidence that your ISMS is an active management system
rather than just a set of documents, and may also demonstrate your corrective
actions and continual improvement in action. Speak to an expert
IT GOVERNANCE GREEN PAPER | AUGUST 2019 10
10
Risk Assessment and ISO 27001 ISMS Measurement – Metrics made easy
IT GOVERNANCE GREEN PAPER | AUGUST 2019 12
12
IT Governance solutions
IT Governance is your one-stop shop for cyber security and IT governance, risk Training
management and compliance (GRC) information, books, tools, training and
We offer training courses from staff awareness and foundation courses, through to
consultancy.
advanced programmes for IT practitioners and certified lead implementers and
auditors.
Our products and services are designed to work harmoniously together so you can
benefit from them individually or use different elements to build something bigger
Our training team organises and runs in-house and public training courses all year
and better.
round, as well as instructor-led and self-paced online training courses, covering a
growing number of IT GRC topics.
Books
Visit www.itgovernance.co.uk/training for more information.
We sell sought-after publications covering all areas of corporate and IT governance.
Our publishing team also manages a growing collection of titles that provide practical Consultancy
advice for staff taking part in IT governance projects, suitable for all levels of
knowledge, responsibility and experience. We are an acknowledged world leader in our field. Our experienced consultants, with
multi-sector and multi-standard knowledge and experience, can help you accelerate
Visit www.itgovernance.co.uk/shop/category/itgp-books to view our full catalogue. your IT GRC projects.
IT Governance Ltd
@ITGovernance
/it-governance
/ITGovernanceLtd