OSE 043 - Block 2 - Unit 2
OSE 043 - Block 2 - Unit 2
MANAGEMENT SYSTEMS
(ISMS) STANDARDS
Structure
2.0 Introduction
2.1 Objectives
2.2 General form of Information Security Management
2.3 An Introduction to Information Security Management Systems (ISMS)
2.3.1 Risk Management: A Brief Description
2.3.2 Plan – Do – Check – Act (PDCA) Process/Approach
2.3.3 Development of an ISMS Framework
2.4 ISO/IEC Information Security Management Systems Family of Standards
2.4.1 Relationship Between Various ISMS Family of Standards
2.4.2 Standards Describing an Overview and Terminology
2.4.3 Standards Specifying Requirements: (ISO/IEC 27001 and ISO/IEC 27006)
2.4.4 Standards Describing General Guidelines: (ISO/IEC 27002, 27003, 27004,
27005 and 27007)
2.4.5 Standards Describing Sector-specific Guidelines: (ISO/IEC 27011 and ISO
27799)
2.4.6 Summary and Conclusion of the ISMS Family of Standards
2.4.7 Benefits of the ISMS Family of Standards
2.5 Let Us Sum Up
2.6 Check Your Progress: The Key
2.0 INTRODUCTION
ISO is the International Organization for Standardization set up at Geneva in 1947.
IEC is the International Electrotechnical Commission set up at Geneva in 1906 to
develop standards for all types of electrotechnologies. ISO and IEC form the
specialized system for worldwide standardization. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC
JTC 1. ISO/IEC JTC 1 SC 27 (a subcommittee of ISO/IEC JTC 1) maintains an
expert committee dedicated to the development of international management
systems standards for information security, otherwise known as the Information
Security Management System (ISMS) family of standards. Fig. 1 shows various
organizations, their relationship and their responsibilities.
to Develop
to
2.1 OBJECTIVES
After studying this unit, you should be able to:
l understand the concepts of information security managements concepts and
management system;
l understand the fundamental concepts of information security management
systems (ISMS);
l understand embedded hierarchy of risk assessment and risk management;
l understand the Plan-Do-Check-Act (PDCA) process approach for ISMS;
l list the steps involved in the development of an ISMS framework;
l understand the scope and purpose of the International Standards in ISMS
family;
l understand the inter-relation between the standards of the ISMS family; and
l understand the benefits of the standards of the ISMS family.
33
Introduction to ISO 27000
34
2) Explain how Organizations can make use of ISMS Family of Standards.
............................................................................................................................. ISO/IEC 27000 Family of
Information Security
............................................................................................................................. Management Systems
(ISMS) Standards
.............................................................................................................................
.............................................................................................................................
3) How does the Information differ from an asset?
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
4) Explain how Security Layer protects Information from attacks.
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
5) Why does an organization need security?
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
6) Explain how Information security management differs from security
management system.
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
37
Fig. 5: PDCA process model applied to ISMS process
Introduction to ISO 27000 Phase-1: The Plan phase is about establishing ISMS i.e. designing the ISMS,
assessing information security risks and selecting appropriate controls.
To establish the ISMS, the organization shall do the following.
l Define the scope and boundaries of the ISMS.
l Define an ISMS policy in terms of the characteristics of the business, the
organization, its location, assets and technology.
l Define the risk assessment approach of the organization.
l Identify, analyse and evaluate the risks.
l Identify and evaluate options for the treatment of risks.
l Select control objectives and controls for the treatment of risks.
l Obtain management approval of the proposed residual risks.
l Obtain management authorization to implement and operate the ISMS.
l Prepare a Statement of Applicability. (The Statement of Applicability provides
a summary of decisions concerning risk treatment.)
Phase-2: The Do phase involves implementing and operating the controls, i.e.do
what was planned to do.
To Implement and operate the ISMS, the organization shall do the following:
l Formulate a risk treatment plan for managing information security risks.
l Implement the risk treatment plan in order to achieve the identified control
objectives. Risk treatment plan is
the process of selection
and implementation of
l Implement controls selectemeasures
d to metoetmodify
the risk.
control objectives.
l Define how to measure the effectiveness of the selected controls and specify
how these measurements are to be used to assess their effectiveness.
l Implement training and awareness programmes.
l Manage operation of the ISMS.
l Manage resources for the ISMS.
l Implement procedures and other controls capable of detecting of security events
and response to security incidents.
Phase-3: The Check phase is about monitoring and reviewing ISMS i.e. measure
the extent to which achievements meet planned objectives.
To Monitor and review the ISMS, the organization shall do the following.
l Execute monitoring procedures to:
l Detect errors in the results of processing;
l Identify attempted and successful security breaches and incidents
l Undertake regular reviews of the effectiveness of the ISMS.
l Review risk assessments at planned intervals.
l Measure the effectiveness of controls to verify that security requirements have
been met.
38
l Conduct internal ISMS audits at planned intervals. ISO/IEC 27000 Family of
Information Security
l Update security plans to take into account the findings of monitoring and Management Systems
reviewing activities. (ISMS) Standards
l Record actions and events that could have an impact on the effectiveness or
performance of the ISMS
Phase-4: In the Act phase is about maintaining and improving ISMS i.e. changes
are made where necessary to bring the ISMS back to peak performance. It enables
organization to learn from the mistakes and improve activities to achieve better
results.
To maintain and improve the ISMS, the organization shall regularly do the
following:
l Implement the identified improvements in the ISMS.
l Take appropriate corrective and preventive. Apply the lessons learnt from the
security.
l Communicate the actions and improvements to all interested parties.
l Ensure that the improvements achieve their intended objectives.
Note: The ISMS is a recurring process as a whole and all the steps mentioned
above should be continuously repeated to ensure the ISMS is effectively protecting
the organization’s information assets on an ongoing basis. It should be noted that
steps 3, 4, 5 and 6 recur more frequently than steps 1 and 2. Since the establishment
of a security policy and the definition of the ISMS scopes are more often
management and strategic issues steps 1 and 2 recur on a longer cycle ( relatively
less frequent).
Check Your Progress 2
Note: a) Space is given below for writing your answers.
b) Compare your answers with the one given at the end of this Unit.
1) Define Information Security Management System.
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
2) What is meant by risk management?
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
3) W ith a neat diagram, explain the concepts of the Plan – Do – Check – Act
(PDCA) process.
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
4) What are the steps involved in the development of an ISMS framework?
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
Risk assessment
Security policy
Asset management
Access control
Information
Informationsecurity
securityincident
incident management
management development
development and
and
Compliance
Compliance
48 .............................................................................................................................
3) Explain the Relationship between various ISMS Family of Standards with a ISO/IEC 27000 Family of
suitable diagram. Information Security
Management Systems
............................................................................................................................. (ISMS) Standards
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
4) What are the various benefits of the ISMS family of standards?
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
49
Introduction to ISO 27000 Check Your Progress 3
1) Refer to Section 2.4
2) Refer to Sub-section 2.4.1
3) Refer to Fig. 7 in Sub-section 2.4.1
4) Refer to Sub-section 2.4.7
50