ISO/IEC 27001 Is An International Standard On How To Manage Information Security. The
ISO/IEC 27001 Is An International Standard On How To Manage Information Security. The
ISO/IEC 27001 Is An International Standard On How To Manage Information Security. The
ISO/IEC 27001:2013 has ten short clauses, plus a long annex, which cover:
1. Scope of the standard
2. How the document is referenced
3. Reuse of the terms and definitions in ISO/IEC 27000
4. Organizational context and stakeholders
5. Information security leadership and high-level support for policy
6. Planning an information security management system; risk assessment; risk
treatment
7. Supporting an information security management system
8. Making an information security management system operational
9. Reviewing the system's performance
10. Corrective action
Operating procedures must be documented and then made available to all users who
need them. Documented operating procedures help to ensure consistent and effective
operation of systems for new staff or changing resources, and can often be critical for
disaster recovery, business continuity and for when staff availability is compromised.
Where information systems are “cloud-based” traditional operational activities such as
system start-up, shut-down, backup etc become less relevant and may often be
outsourced to a cloud provider. In more traditional computing environments and
architectures operating procedures are much more likely to be required.
3. Inventory of Assets
Any assets associated with information and information processing facilities need to be
identified and managed over the lifecycle, always up to date. A register or inventory of
those assets has to be put together that shows how they are managed and controlled,
based around their importance.
4. Ownership of Assets
All information assets must have owners. Asset management ownership can be
different to legal ownership too, and it can be done at an individual level, department, or
other entity. Ownership should be assigned when the assets are created.
The asset owner is responsible for the effective management of the asset over the
whole of the asset’s lifecycle. They can delegate management of that too and
ownership can change during that lifecycle as long as both are documented.
Acceptable use of information and of assets is important to get right. Rules for
acceptable use of assets is often documented in an “Acceptable Use Policy”. The rules
for acceptable use must take into consideration employees, temporary staff, contractors
and other third parties where applicable across the information assets they have access
to. It is important that all relevant parties have access to the set of documented
acceptable use rules and these are reinforced during regular training and information
security awareness, compliance-related activity.
6. Return of Assets
All employees and external party users are expected to return any organisational and
information assets upon termination of their employment, contract or agreement. As
such it must be an obligation for employees and external users to return all the assets
and these obligations would be expected in the relevant agreements with staff,
contractors and others.
7. Network Controls
9. Segregation in Networks