Vijay - Challenges of An ISMS Implementation
Vijay - Challenges of An ISMS Implementation
VIJANDRAN RAMASAMY - CISSP INFORMATION SECURITY OFFICER ISM INSURANCE SERVICES MALAYSIA BERHAD
ISMS STANDARD
The ISO/IEC 27001:2005 International Standard establishes guidelines, and general principles for initiating, implementing, maintaining, & improving information security management in an organization. The control objectives, & controls of this International Standard are intended to be implemented to meet the requirements identified by a risk assessment.
PURPOSE OF ISMS
To protect ISM Insurance Services Malaysia Berhad (ISM) from adverse impact on its reputation, & operations that could result from failures of Confidentiality, Integrity, and Availability. Information security is the preservation of C-I-A.
2.
3. 4. 5.
Actuarial & Statistical Services Administration & Accounts Anti-Fraud Services IT Services Research & Development Services
Compliance (11)
Avoiding breaches of law, regulatory or contractual requirements.
Establish Roles
Certification Roadmap
Information Security Forum ISMS Steering Committee ISMS Secretariats ISMS Internal Auditor ISMS Implementation Team
ISMS Awareness Training Security Awareness Training ISO/IEC 27001:2005 Implementation Course ISO/IEC 27001:2005 Lead Auditor Course
Management Review
IS Risk Assessment Methodology IS Risk Assessment Report Risk Treatment Plan Develop relevant policies & procedures Develop security metrics
Records Maintenance
Application
Stage 1 Audit
Stage 2 Audit
Certification
Documentation Audit
Onsite Audit
Certified
PHASE 4: ISMS MAINTENANCE AND CONTINOUS IMPROVEMENT Enhance security controls and implementation. Evaluation of controls effectiveness. Measurement of effectiveness of control. Enhance security metrics.
Tendency for individual interpretation of the standard, different auditors may have different focus and expectations.
POST-IMPLEMENTATION IMPROVEMENTS
Account Management SUM Site-To-Site VPN (STS-VPN) High availability and load balancing of ISM computer and communication systems. Development of applications based on SDLC as per ISMS control objective. Implementation and testing of disaster recovery plans. Establishment of DRC site.
RECOMMENDATIONS
Guidance on effective ISMS scoping. Interrelate to other standards and regulatory compliance (e.g. ITIL, GPIS-1, SOX, Basel II, etc.). To supplement ISO/IEC 27001:2005 with more implementation guidance, especially in the are of security metrics and measurement, risk assessment. To have more objective way of measurement based on a security maturity model or progressive improvement. ISO/IEC 27003 Working Draft for ISMS Implementation Guidance.
RESOURCES
Here are a few good resources to check when considering ISMS implementations and certifications: www.irca.org www.iso27001security.com www.iso27001certificates.com www.sirim.my/iscg