ISO 27001-2005 Implementation Course
ISO 27001-2005 Implementation Course
Information Security
Management System
ISO/IEC 27001:2005
Implementation
INFORMATION SECURITY
MANAGEMENT SYSTEM
IMPLEMENTATION
ISO/IEC 27001:2005
Syllabus
3
Overview of an ISMS
Identifying risks
Syllabus
4
(Cont.)
Overview of an ISMS
5
Overview of an ISMS
6
Overview of an ISMS
7
Overview of an ISMS
8
Overview of an ISMS
9
All activities must follow a method. The method is arbitrary but must
be well defined and documented.
Overview of an ISMS
10
Overview of an ISMS
11
These practices form the framework within which you will establish
an ISMS.
Overview of an ISMS
12
Overview of an ISMS
13
Overview of an ISMS
14
Technology
- System Security
- UTM. Firewalls
- IDS/IPS
- Data Center
- Physical Security
- Vulnerability
Assessment
- Penetration Testing
- Application
Security
- Secure SDLC
- SIM/SIEM
- Managed Services
- Training
- Awareness
- HR Policies
- Background
Checks
- Roles /
responsibilities
- Mobile
Computing
- Social
Engineering
- Social
Networking
- Acceptable Use
- Policies
- Performance Mgt
People
Process
- Risk
Management
- Asset
Management
- Data
Classification
- Info Rights Mgt
- Data Leak
Prevention
- Access
Management
- Change
Management
- Patch
Management
15
16
17
In addition, management will participate in the ISMS Plan-Do-CheckAct [PDCA] process, as described in ISO/IEC 27001 by:
While reviewing these lists, you might want to answer questions similar
to the following:
the processes used to establish the scope and context of the ISMS.
Scope Example:
28
Note: Too narrow scope will create more burden and headache.
Lots of companies try to decrease their implementation costs by
narrowing the scope, but they often find themselves in a situation
where such a scope gives them a headache. The problem when the
ISO 27001 scope is not the whole organization is that the Information
Security Management System (ISMS) must have interfaces to the
outside world in that context, the outside world are not only the
clients, partners, suppliers etc., but also the organizations departments
that are not within the scope. It may seem funny, but a department
which is not within the scope should be treated in the same way as an
external supplier.
Example:
The text added to the scope statement as a result of identifying
applicable legislation is shown in the following example in italics.
ISO/IEC 27001 does not specify the risk assessment method you
should use; however, it does state that you must use a method that
enables you to complete the following tasks:
ISO/IEC 31000:2009
There are many risk assessment methods you can choose from, such
as those that are prevalent in your industry. For example, if your
company is in the oil industry, you might find there are risk assessment
methods related to that industry.
Results:
When you have completed this step, you should have a document that
explains how your organization will assess risk, including:
To identify risks and the levels of risks associated with the information
you want to protect, you first need to make a list of all of your
information assets that are covered in the scope of the ISMS.
Result:
When you have completed this step, you should have a list of the
information assets to be protected and an owner for each of those
assets. You might also want to identify where the information is located
and how critical or difficult it would be to replace. This list should be
part of the risk assessment methodology document that you created in
the previous step. Because you will need this list to document your risk
assessment, you might want to group the assets into categories and
then make a table of all the assets with columns for assessment
information and the controls you choose to apply.
Identifying risks
42
Next, for each asset you defined in the previous step, you will need to
identify risks and classify them according to their severity and
vulnerability. In addition, you will need to identify the impact that loss of
confidentiality, integrity, and availability may have on the assets.
Identifying risks
43
Identifying risks
44
Identifying risks
45
For each asset, you should identify vulnerabilities that might exist for
that asset and threats that could result from those vulnerabilities. It is
often helpful to think about threats and vulnerabilities in pairswith at
least one pair for each asset and possibly multiple pairs for each asset.
Identifying risks
46
Results:
For each asset, you will have a threat and vulnerability description and,
using your Risk Assessment methodology, you will assign levels of
confidentiality, integrity, and availability to that asset.
After you have identified the risks and the levels of confidentiality,
integrity, and availability, you will need to assign values to the risks. The
values will help you determine if the risk is tolerable or not and whether
you need to implement a control to either eliminate or reduce the risk.
The damage that the risk might inflict on the company or its
customers or partners
For example, you might assign values of Low, Medium, and High to
your risks. To determine which value to assign, you might decide that if
the value of an asset is high and the damage from a specified risk is
high, the value of the risk should also be high, even though the
potential frequency is low. Your Risk Assessment Methodology
document should tell you what values to use and might also specify the
circumstances under which specific values should be assigned. Also,
be sure to refer to your Risk Assessment Methodology document to
determine the implication of a certain risk value.
Lists of assets and their associated risks and CIA levels, which you
created in the previous step.
Results:
When you have completed your assessment, you will have identified
which information assets have intolerable risk and therefore require
controls. You should have a document (sometimes referred to as a
Risk Assessment Report) that indicates the risk value for each asset. In
the next step you will identify which controls might be applicable for the
assets that require control in order to reduce the risk to tolerable levels.
This document can either be standalone or it can be part of an overall
Risk Assessment document that contains your risk assessment
methodology and this risk assessment.
tolerate
treat
transfer
terminate
Resourcing controls
Reaction planning
(Cont.)
Individual employees:
Next, for the risks that youve determined to be intolerable, you must
take one of the following actions:
Decide to accept the risk, for example, actions are not possible
because they are out of your control (such as natural disaster or
political uprising) or are too expensive.
Transfer the risk, for example, purchase insurance against the risk,
subcontract the activity so that the risk is passed on to the
subcontractor, etc.
Results:
You should end up with two documents by completing this step:
A Statement of Applicability
The method selected for treating each risk (accept, transfer, reduce)
For each control that you define, you must have corresponding
statements of policy or in some cases a detailed procedure. The
procedure and policies are used by affected personnel so they
understand their roles and so that the control can be implemented
consistently. The documentation of the policy and procedures is a
requirement of ISO/IEC 27001.
Results:
Additional policy and procedure documents. (The number of
documents you produce will depend on the requirements of your
organization.) Some of these procedures might also generate records.
For example, if you have a procedure that all visitors to your facility
must sign a visitors log, the log itself becomes a record providing
evidence that the procedure has been followed. Sections 4.3.2 and
4.3.3 of ISO/IEC 27001 require that all documents and records that are
part of your ISMS be properly controlled. Therefore, policy and
procedure documents must also be created to address these controls.
Results:
Specific documentation is not required in the ISO/IEC standards.
However, to provide evidence that resource planning and training has
taken place, you should have some documentation that shows who has
received training and what training they have received. In addition, you
might want to include a section for each employee that lists what
training they should be given. Also, you will probably have some type of
procedure for determining how many people, how much money, and
how much time needs to be allocated to the implementation and
maintenance of your ISMS. Its possible that this procedure already
exists as part of your business operating procedures or that you will
want to add an ISMS section to that existing documentation.
The results of the reviews and audits must be documented and records
related to the reviews and audits must be maintained.
(Cont.)
Results:
The results of a management review should include decisions and
actions related to:
Resource needs
83
If you plan to have your ISMS certified, you will need to conduct a full
cycle of internal audits, management review, and activities in the PDCA
process. The external auditor will first examine your ISMS documents
to determine the scope and content of your ISMS. Then the auditor will
examine the necessary records and evidence that you implement and
practice what is stated in your ISMS.
What you will need:
Results:
The results of this preparation should be a set of documents that you
can send to an auditor for review and a set of records and evidence
that will demonstrate how efficiently and completely you have
implemented your ISMS.
Documents
(Cont.)
Statement of Applicability
Records
The records required for your ISMS will depend on the requirements of
your business. ISO/IEC 27001:2005(E) states that records shall be
established and maintained to provide evidence of conformity to
requirements and the effective operation of the ISMS. It further states
that the ISMS shall take account of any relevant legal or regulatory
requirements and contractual obligations. They should be controlled
and maintained according to the organizations document control and
retention policies and procedures.
Incident reports
Any questions?
91