2 Clause-Wise Requirements of ISMS Management System
2 Clause-Wise Requirements of ISMS Management System
1.0 Introduction
What is Information Security Management System (ISMS)?
Of late, industries have been reactive towards ISMS management, which has led to the
concept of end-of-pipe treatment of ISMS. Now it is an established fact that this concept
alone could not yield the desired objectives, viz. ISMS protection. In this scenario, the
concept of ISMS through prevention of information security incident is taking shape.
Although the ISO 27001:2013 standard doesn‟t prescribe the method for determining the
context of the organization, there are some logical steps and milestones.
First, you need to determine which of the new requirements are already met in your
existing documentation.
As an existing company, you may have already implemented ISO 27001:2005 and defined
the scope of the Information Security Management System (ISMS) in the ISMS Manual,
the sequence of processes and their interaction. These will be either in the form of text or
a flowchart.
If you are implementing the standard from scratch, then you need to determine the scope
of your ISMS and identify the processes and their interactions.
Once the scope of the ISMS is defined with any permissible exclusion, the processes and
their inter-relationships are then identified.
To determine external context of the organization, you should consider issues arising from
its social, political, legal, regulatory, financial, economic, technological, competitive
environment, key organizational drivers, organizational trends, relationship with external
stakeholders and culture. Examples of external context may include:
Government regulations and changes in the law;
The requirements of regulatory bodies such as the Factories Act / IT Act / Govt. of
India rules, etc.
The organization‟s competition;
The events that may affect corporate image;
Changes in technology.
To determine internal context of the organization, you should consider issues arising from
its values and culture, organizational structure, governance, current roles and
responsibilities, system and tools, resource levels, capabilities, process maturity, decision
making process, relationship with internal stakeholders. Examples of internal context may
include:
Higher turnover of the employees can lead to delay in arranging training or many
training courses need to be arranged;
Technology changes;
Employees‟ welfare;
Decision making process is slow;
Changes and trends having risk on the ISMS objectives of the organization;
Transportation, etc.
4.2. Understanding the needs and expectations of interested parties
The requirement for identifying relevant interested parties means that you need to decide
whose opinion your organization should consider.
These interested parties include:
Direct customers / end users;
Legal authority;
Employees;
External providers;
Corporate partners;
Statutory and regulatory bodies (e.g. IT officer / Govt. Officer, etc.);
Owners / shareholders;
Insurance provider;
Their feedback can help you to determine how and what can be improved in your
organization.
Their requirements:
What are the terms and conditions?
When I will be paid?
Have we got effective communications?
What information do I need and when can they give it to me? Are they above
board?
Are they compliant with the applicable requirements?
The scope of information security management system should be in terms of products and
services, the main processes to deliver them, and the sites of the organization.
The scope should provide justification where requirement is not applicable to the scope of
information security management system and such requirements do not affect conformity
of product and service and information security.
6.1.1 General
Consider issues and requirements to determine risks and opportunities.
The risks and opportunities that need to be addressed to:
a) ensure the ISMS can achieve its intended outcome;
b) prevent, or reduce, undesired effects;
c) achieve continual improvement.
Plan actions to address risks and opportunities.
Plan how to integrate and implement the actions into processes.
Plan to evaluate the effectiveness of these actions.
6.1.2 Information security risk assessment
This standard expects an organization to determine and provide the appropriate number
of personnel to effectively implement the ISMS and for the operation and control of its
processes.
Infrastructure
A company must consider all the things it will need in order to deliver a service/product to
the customer/client. The need for following things must be considered:
It might be that, during a review, the control measures within a process are insufficient and
do not give the level of assurance that the Directors want in order to know that processes
are being followed correctly.
Organization must continually improve the suitability, adequacy, and effectiveness of the
information security management system to enhance ISMS performance. When taking
action to improve the information security management system, consider the results from
The controls in Annex-A have been restructured, and some controls have disappeared
or been merged into other controls, and new controls have emerged.
Comparison of clauses/ domains of Annex-A in old standard and new standard
ISO 27001:2005 ISO 27001:2013
A5. Security policy A5. Information security policies
A6. Organization of information security A6. Organization of information security
A7. Asset management A7. Human resource security
A8. Human resources security A8. Asset management
A9. Physical and environmental security A9. Access control
Communications and operations
A10. A10. Cryptography
management
A11. Access control A11. Physical and environmental security
Information systems acquisition,
A12. A12. Operations security
development and maintenance
Information security incident
A13. A13. Communications security
management
System acquisition, development and
A14. Business continuity management A14.
maintenance
A15. Compliance A15. Supplier relationships
Information security incident
A16.
management
Information security aspects of business
A17.
continuity management
A18. Compliance
The scope of ISO 27001:2013 states, in part, that this International Standard is
applicable where an organization needs to demonstrate its ability to consistently meet
customer and applicable statutory and regulatory requirements. No requirement of this
International Standard can be interpreted as extending that applicability without the
agreement of the organization.
3. Risk assessment
The FMEA (Failure Mode and Effects Analysis) provides a third very interesting
parameter: the probability of detection. This is the probability that the occurrence of a
threat is detected by using detection actions before any major impact has happened.
An example of detection action is virus scans or intrusion detection.
4. Applicability
Where a requirement can be applied within the scope of its information security
management system, the organization cannot decide that it is not applicable. Where a
requirement cannot be applied (for example, where the relevant process is not carried
out) the organization can determine that the requirement is not applicable. However,
General
Include documented information required;
Include documented information determined by
the organization as necessary for the
effectiveness of the ISMS;
Documented information The extent of documentation depends on:
7.5.1
Size of the organization and type of its activities,
processes, products and services;
Complexity of processes and their interactions;
Competence of persons.
Documented information may differ from one
organization to another.
Create and update documented information;
Identification and description (e.g. a title, date,
author, or reference number);
Proper format (e.g. language, software version,
7.5.2 Creating & updating graphics) and media (e.g. paper, electronic);
Review and update and re-approve for suitability
and adequacy;
Approve information for adequacy and suitability
prior to issue.
Control documented information to ensure:
Availability and suitability for use;
Adequately protected (e.g. from loss of
confidentiality, improper use, or loss of integrity);
Distribution, access, retrieval and use;
Storage and preservation (including the
preservation of legibility);
Control of changes and current revision status;
Control of documented Retention and disposition;
7.5.3
information Ensure the recent versions are available at points
of use;
Ensure information of external origin as identified
by IS Head are included for same level of
controls;
Ensure distribution of information is controlled;
Prevent unintended use of obsolete information;
Apply suitable identification;
Access to information for review or change.
8. Operation
Plan, implement and control the processes;
Implement the actions from risks and
Operation planning and opportunities;
8.1
control Implement the risk treatment plan and controls to
achieve the IS objectives;
Maintain documented information to establish
10. Improvement
The objective of this comparison is to demonstrate that both systems can be used together for
those organizations that already have got certified under ISO 27001:2005 International Standard
and they can easily update their system with ISO 27001:2013 standard.
1 Scope 1 Scope
4.1 Understanding the organization and its context 8.3 Preventive action
4.2 Understanding the needs and expectations of 5.2.1(c) Identify and address legal and regulatory
interested parties requirements and contractual security obligations
4.3 Determining the scope of the information security 4.2.1 a) Define scope and boundaries
management system 4.2.3 f) Ensure the scope remains adequate
6.1.1 Actions to address risks and opportunities - general 8.3 Preventive action
6.2 Information security objectives and planning to 5.1 b) Ensuring that ISMS objectives and plans are
achieve them established
8.1 Operational planning and control 4.2.2 f) Manage operations of the ISMS
8.2 Information security risk assessment 4.2.3 d) Review risk assessments at planned intervals
8.3 Information security risk treatment 4.2.2 b) Implement the risk treatment plan
4.2.2 c) Implement controls
10.1 Nonconformity and corrective action 4.2.4 Maintain and improve the ISMS
8.2 Corrective action