06-5 ISMS Change Process - V1.0
06-5 ISMS Change Process - V1.0
not found
Customer Name
Change Process
Version 1.0
Review Annually
Standard, Risk
management (Level 2)
Policy (Level 3)
Guidance (Level 4)
1
Customer Name Error: Reference source
not found
Change history:
Collaborators and
Auditors
Management
Head of Department
2
Customer Name Error: Reference source
not found
Contents
Introduction...........................................................................................................................................4
Process overview...................................................................................................................................4
ISMS change process.............................................................................................................................5
Change to ISMS identified.................................................................................................................6
Categorise change.............................................................................................................................6
Change approval................................................................................................................................7
Change planning................................................................................................................................7
Plan approval.....................................................................................................................................7
Plan execution...................................................................................................................................8
Post-execution review.......................................................................................................................8
3
Customer Name Error: Reference source
not found
Introduction
With the implementation of an information security management system (ISMS)
that aligns with the ISO/IEC 27001 international standard for information
security, [Organization Name] places significant importance on the continuous
effectiveness of its ISMS amidst frequent changes. The nature of these changes
impacting the ISMS can vary and may encompass the following:
To maintain the alignment of our ISMS with its defined objectives, it is essential
to manage all types of changes, whether they are anticipated or unforeseen,
abrupt or gradual. This document outlines a systematic approach for identifying
and managing changes, encompassing thorough planning, efficient execution,
and necessary approvals.
Process overview
The overall process for the management of changes to the ISMS is shown in
Figure 1. This process is followed whenever a planned or unplanned event that
affects the ISMS is identified.
4
Customer Name Error: Reference source
not found
5
Customer Name Error: Reference source
not found
necessitate adherence to this process. Here are some examples of such minor
changes: are:
Roles within the ISMS (for example, information security steering group,
information security manager)
Employees and contractors of the organization
Suppliers to the organization
Internal and external auditors
Regulators and lawmakers
Customers and clients
Categorise change
The information security manager will carefully review the proposed change to
determine its approval process. If the change is considered a standard change,
the information security manager has the authority to approve it. However, if the
change is deemed significant and has substantial implications for the ISMS or
fundamentally alters its operations, it will be referred to the information security
steering group for further assessment and decision-making.
6
Customer Name Error: Reference source
not found
Change approval
Changes that do not need to be referred will be assessed by the information
security manager. If necessary, further detail should be requested and if the
change is acceptable, it will be recorded as approved. If not, the change will be
rejected, and the decision, together with the reasons for it, communicated to the
person who proposed it.
Changes that need to be referred to the information security steering group will
be circulated to the members of that group at the earliest opportunity for
discussion. The chair of the group will be responsible for arriving at a decision
regarding the proposed change, in consultation with the other members. If the
change is acceptable, the decision will be communicated by the chair to the
information security manager who will record it as approved. If not, the change
will be rejected, and the decision, together with the reasons for it, communicated
by the information security manager to the person who proposed it.
Change planning
A plan must be produced for approved changes prior to their implementation.
The information security manager will be responsible for deciding who should
plan and implement the change, depending on its subject area. For changes
approved by the information security manager, the degree of planning
performed must be sufficient to give confidence that the change has been
thought through and is likely to be successful. Basic documentation, such as an
email, is required for such changes, setting out:
For more significant changes which have been approved by the information
security steering group, the areas of planning should be similar, but
correspondingly more detailed to reflect the possibly increased risk and
resources required.
Plan approval
After creating the plan, it must be reviewed and approved by the same level of
authority as before. Special consideration should be given to the timing outlined
in the plan to minimize any disruption to the functioning of the ISMS. If the plan
is not approved, the planner may have the opportunity to make necessary
adjustments to make it acceptable. If adjustments cannot be made or the plan
remains unacceptable, the change will be rejected at this stage.
7
Customer Name Error: Reference source
not found
Plan execution
Subsequently, the plan should be executed according to the defined steps, and
the change must be effectively managed until its completion. Throughout the
implementation process, it is essential to keep the information security manager
informed of the progress. Once the implementation is finalized, the information
security manager should also be notified of its completion.
Post-execution review
After the completion of changes to the ISMS, it is important to conduct a post-
change review to ensure that the intended effects of the change have been
achieved. The specific duration for the review will be determined by the
information security manager and documented in the ISMS Change Log, taking
into account the nature of the change.