0% found this document useful (0 votes)
295 views2 pages

Information Security and Data Protection 1697064018

This document outlines an integrated approach to information security and data protection. It discusses how key aspects such as management systems, standards, scope, leadership, gap analysis, risk management, communication, policies, frameworks, auditing and more can be integrated and managed with a single coordinated program and procedures. The same internal audit program and management review would be used for both information security and data protection. General security measures, incident response and data transfer requirements would also take an integrated approach.

Uploaded by

N Sai Avinash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
295 views2 pages

Information Security and Data Protection 1697064018

This document outlines an integrated approach to information security and data protection. It discusses how key aspects such as management systems, standards, scope, leadership, gap analysis, risk management, communication, policies, frameworks, auditing and more can be integrated and managed with a single coordinated program and procedures. The same internal audit program and management review would be used for both information security and data protection. General security measures, incident response and data transfer requirements would also take an integrated approach.

Uploaded by

N Sai Avinash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Information Security and Data Protection integrated approach

1.0, 21.11.2022

Topic Information Security Data Protection

1. Management ISMS PIMS


System

2. Standard ISO 27001 ISO 27701

3. Context List of requirements (integrated)


List of interested parties (integrated)

ISMS Scope Data Protection Scope

4. Leadership and CISO CPO


oversight
DPO / DPM

Information Security and Data Protection Committee (integrated)

5. Gap analysis ISO 27001 + Annex A (IS GDPR / ISO 27701 /


controls) / NIST Cybersecurity ICO Accountability Framework /
Framework TrustArc-Nymity Framework

6. Inventory Asset Register Data-mapping


Records of processing activities
(ROPA)

7. Risks Information Security Risk Management (methodology and procedure)

Business Impact Analysis (BIA) Data Protection Impact


Assessment (DPIA)

8. Communication Integrated approach


plan

9. Policy Information Security Policy Data Protection Policy

10. Framework Information Security Framework Data Protection Framework

11. Document Integrated approach


management

12. Awareness Introduction Introduction


(Information Security) (Data protection and Privacy)

Integrated Program
General topics: information security requirements, phishing, incident
notification…

13. Internal audit The same procedure


Integrated Program

by Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001


www.patreon.com/AndreyProzorov
Information Security and Data Protection integrated approach
1.0, 21.11.2022

Topic Information Security Data Protection

14. Monitoring, The same procedure


measurement,
analysis and Information Security objectives, Data Protection objectives, KPIs
evaluation KPIs and metrics and metrics

15. Management The same procedure


review
ISMS Management Review PIMS Management Review
16. Nonconformity The same procedure
management
17. Continual The same procedure
improvement
18. Supplier Integrated approach (Selection and evaluation, audit…)
management
Non-Disclosure Agreement (NDA) Data Processing Agreement
(DPA)
19. Information General information security measures (e.g., access control,
security vulnerability management, encryption, DLP)
measures
Statement of Applicability (SoA) Data Protection by Design
Privacy enhancing technologies
(PET)
Monitoring tools Privacy in working life
(e.g., DLP, SIEM, UEBA)

20. Incident Incident Management Procedure Data Breach Notification


management (the general procedure) (part of the general procedure)
21. Data transfer Information Security Data Transfer Impact Assessment
(e.g., encryption, DLP) Standard Contractual Clauses
(SCC) / Binding Corporate Rules
(BCR)
22. Other Information Classification and Purposes and lawful basis
requirements Labeling Legitimate Interest Assessment
Threat intelligence (LIA)
Intellectual property rights Retention period
Screening Notification and consent
Disciplinary process Subjects’ requests
Physical security (e.g., secure
areas, security perimeters,
physical security monitoring)
Capacity management
Configuration and change
management
Penetration testing

by Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001


www.patreon.com/AndreyProzorov

You might also like