Introduction To ISO 27001
Introduction To ISO 27001
INTRODUCTION
TO ISO 27001
An overview of the standard.
1
Introduction to ISO 27001
The "CIA" triad is a foundational model in information security, representing the three core
principles that guide efforts to protect information.
These three principles work together to provide a balanced approach to information security,
protecting data from various threats while ensuring it remains usable and reliable.
Components of an ISMS
The description in ISO 27001 of 'what is an ISMS' is determined by several key clauses in the
standard, which we will go through shortly, but in essence, the big building blocks are aligned to
the clauses of the standard. Effectively they are;
• Context of the Organization - Understanding the internal and external issues that can
affect the ISMS and identifying the needs and expectations of interested parties.
• Leadership - Establishing top management commitment, assigning ISMS roles and
responsibilities, and ensuring communication.
• Planning - Addressing risks and opportunities, setting information security objectives,
and planning to achieve them.
2
Introduction to ISO 27001
3
Introduction to ISO 27001
Risk Assessment
Typically, risk assessment will involve the following steps;
1. Establish Context - Define the risk assessment's scope, including the ISMS's boundaries
and the organisational context.
2. Risk Identification - Identify potential risks that could affect information assets'
confidentiality, integrity, and availability. This involves identifying threats, vulnerabilities,
and the potential impact on the organisation.
3. Risk Analysis - Assess the identified risks to determine their likelihood and potential
impact. This analysis helps prioritise risks based on their severity.
4. Risk Evaluation - Compare the risk analysis results against established risk criteria to
determine which risks require treatment. This involves determining the organisation's risk
tolerance and deciding which risks are acceptable and which need mitigation.
1. Risk Avoidance - Avoiding activities that expose the organisation to risk. This might
involve changing processes, discontinuing certain operations, or avoiding particular
projects.
2. Risk Reduction - Implementing controls to reduce the likelihood or impact of risks. This
could include technical controls, such as firewalls and encryption, and organisational
controls, such as policies and procedures.
3. Risk Sharing - Transferring or sharing the risk with another party, such as through
insurance or outsourcing.
4. Risk Retention - Accepting the risk when the cost of mitigation is higher than the
potential impact or when the risk is deemed low enough to be acceptable.
Either way, each significant risk will require a treatment plan clearly outlining how you will
manage it (see the next section).
4
Introduction to ISO 27001
5
Introduction to ISO 27001
Subclauses include;
• Understanding the Organisation and its Context - Identify external and internal
issues relevant to the organisation's purpose and how they affect its ability to achieve
the intended outcomes of the ISMS.
• Understanding the Needs and Expectations of Interested Parties - Determine
stakeholders' requirements, such as customers, regulators, and employees.
• Determining the Scope of the ISMS - Define the boundaries and applicability of the
ISMS.
5. Leadership
Leadership plays a crucial role in the success of the ISMS. This clause requires top
management to demonstrate commitment to the ISMS, establish an appropriate
information security policy, and assign roles and responsibilities for information security.
Subclauses include;
6. Planning
This clause addresses the actions needed to manage risks and opportunities related to
information security. It involves setting information security objectives and planning how
6
Introduction to ISO 27001
to achieve them. Planning also includes considerations for changes to the ISMS to
ensure they are managed in a controlled manner.
Subclauses include;
7. Support
Support involves the resources, competence, awareness, communication, and
documented information necessary for the effective operation of the ISMS. This clause
ensures the organisation has the necessary support structure to maintain and improve
the ISMS.
Subclauses include;
• Resources - Determine and provide the resources needed for the ISMS.
• Competence - Ensure that personnel are competent based on appropriate
education, training, or experience.
• Awareness - Ensure that personnel know the ISMS and their roles within it.
• Communication - Determine the need for internal and external communication
relevant to the ISMS.
• Documented Information - Control the creation, updating, and control of
documented information required by the ISMS.
8. Operation
Operational planning and control are covered in this clause. It requires the organisation
to plan, implement, and control the processes needed to meet ISMS requirements and
achieve information security objectives.
Subclauses include;
• Operational Planning and Control - Plan, implement, and control the processes
needed to meet ISMS requirements and achieve information security objectives.
• Information Security Risk Assessment – As explored earlier, an organisation must
look at and assess the risks it faces.
• Information Security Risk Treatment – The assessments then feed into creating risk
treatment plans to manage the risks.
9. Performance Evaluation
7
Introduction to ISO 27001
Subclauses include;
10. Improvement
This clause focuses on continual improvement of the ISMS. It requires the organisation to
address nonconformities and take corrective actions. Continual improvement ensures
the ISMS remains effective and relevant over time.
Subclauses include;
• Nonconformity and Corrective Action - Address nonconformities and take
corrective actions.
• Continual Improvement - Continually improve the suitability, adequacy, and
effectiveness of the ISMS.
Annexes
Annex A: Information Security Controls Reference
I warned you earlier about Annex A, the Statement of Applicability (SoA).
Annex A provides a comprehensive list of 93 controls that can be used to manage information
security risks.
Typically, we create a spreadsheet or list of the controls and then explain how we meet them.
These controls are organised into four categories: organisational, people, physical and
technical.
It is worth noting that while some information security standards like NIST 800-53 are absolutely
prescriptive regarding the types of firewall, encryption, and other controls you need to use, ISO
27001 asks you to define which controls apply to your organisation and to what level. So, it's
very much up to you to respond to each control with a justification for how you feel you meet it.
8
Introduction to ISO 27001
Examples:
Intent: These controls are designed to manage and mitigate human-related risks by ensuring
that employees, contractors, and third-party users understand their roles and responsibilities in
information security.
Examples:
Intent: These controls protect the organisation's physical premises and assets from
unauthorised physical access, damage, or interference.
Examples:
• Physical entry controls: Implementing security measures like access cards and
biometrics to restrict entry to sensitive areas.
• Equipment security: Ensuring equipment is physically protected from theft or damage.
• Supporting utilities: Safeguarding power and telecommunications infrastructure to
ensure continuous operation.
A.8 Technological Controls
Intent: These controls focus on implementing and managing technology to protect information
assets from security threats.
Examples:
9
Introduction to ISO 27001
• Access control: Managing who has access to information systems and data.
• Cryptography: Using encryption to protect data confidentiality and integrity.
• System acquisition, development, and maintenance: Ensuring security is considered
throughout the lifecycle of information systems.
• Scope - ISO 27001 outlines the requirements for creating and managing an ISMS,
focusing on risk management and continuous improvement.
• Scope - ISO 27002 serves as a supplementary standard to ISO 27001, providing detailed
guidelines on selecting, implementing, and managing the controls listed in Annex A of
ISO 27001.
10
Introduction to ISO 27001
• Flexibility - While ISO 27002 provides comprehensive guidance, it is more flexible and
can be used by organisations that are not necessarily seeking ISO 27001 certification but
still wish to improve their information security practices.
Conclusion
Understanding the fundamentals of the ISO 27001 standard is essential for any organisation
aiming to enhance its information security posture.
I seriously recommend getting a copy and reading it through. It's surprisingly light and easy to
read.
The standard provides a structured approach to managing sensitive information by
implementing an Information Security Management System (ISMS).
By following the guidelines and controls outlined in ISO 27001, organisations can ensure their
information assets' confidentiality, integrity, and availability.
Key Takeaways
• Comprehensive Framework: ISO 27001 offers a comprehensive framework for
managing information security risks through structured clauses and controls.
• Risk Management: The standard emphasises the importance of risk assessment and
treatment, enabling organisations to proactively manage threats and vulnerabilities.
• Integration with ISO 27002: ISO 27001's relationship with ISO 27002 provides detailed
guidance on implementing controls, ensuring that organisations adopt best practices.
By implementing ISO 27001, organisations protect their information assets and build trust with
customers, partners, and stakeholders.
Important Notice
This document is provided for personal use only. Commercial or consultative use requires a licence. For detailed terms of use, please visit
https://www.iseoblue.com/terms.
11
Introduction to ISO 27001
12