What is ISO 27001 – 2013 ISMS
ISO/IEC 27001, part of the growing ISO/IEC 27000 family of standards, is an Information Security Management System (ISMS) standard published in October 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Its full name is ISO/IEC 27001:2013 – Information technology — Security techniques — Information security management systems — Requirements but it is commonly known as “ISO 27001”.
ISO/IEC 27001 formally specifies a management system that is intended to bring information security under explicit management control. Being a formal specification means that it mandates specific requirements. Organizations that claim to have adopted ISO/IEC 27001 can therefore be formally audited and certified compliant with the standard (more below).
Most organizations have a number of information security controls. Without an ISMS however, the controls tend to be somewhat disorganized and disjointed, having been implemented often as point solutions to specific situations or simply as a matter of convention. Maturity models typically refer to this stage as “ad hoc”. The security controls in operation typically address certain aspects of IT or data security, specifically, leaving non-IT information assets (such as paperwork and proprietary knowledge) less well protected on the whole. Business continuity planning and physical security, for examples, may be managed quite independently of IT or information security while Human Resources practices may make little reference to the need to define and assign information security roles and responsibilities throughout the organization.
ISO/IEC 27001 requires that management:
- Systematically examine the organization’s information security risks, taking account of the threats, vulnerabilities and impacts;
- Design and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment (such as risk avoidance or risk transfer) to address those risks that are deemed unacceptable; and
- Adopt an overarching management process to ensure that the information security controls continue to meet the organization’s information security needs on an ongoing basis.
ISO/IEC 27001:2013 is intended to be suitable for several different types of use, including the following:
- se within organizations to formulate security requirements and objectives;
- use within organizations as a way to ensure that security risks are cost effectively managed;
- use within organizations to ensure compliance with laws and regulations;
- use within an organization as a process framework for the implementation and management of controls to ensure that the specific security objectives of an organization are met;
- definition of new information security management processes;
- identification and clarification of existing information security management processes;
- use by the management of organizations to determine the status of information security management activities;
- use by the internal and external auditors of organizations to determine the degree of compliance with the policies, directives and standards adopted by an organization;
- use by organizations to provide relevant information about information security policies, directives, standards and procedures to trading partners and other organizations with whom they interact for operational or commercial reasons;
- implementation of business-enabling information security;
- use by organizations to provide relevant information about information security to customers.
Benefits of OHSAS 18001:2007
The benefits of standardization, and of implementation of one or more of the ISO 27000 series are wide and varied. Although they tend to differ from organization to organization, many are common.
The following is a list of potential benefits. As with many items on this website, this is an ongoing project. Please feel free to add further points via the comments option below.
This is a general benefit of standardization. The idea is that systems from diverse parties are more likely to fit together if they follow a common guideline.
Management can be assured of the quality of a system, business unit, or other entity, if a recognized framework or approach is followed.
Compliance with, or certification against, and international standard is often used by management to demonstrate due diligence.
Organizations often use a standard as a measure of their status within their peer community. It can be used as a bench mark for current position and progress.
Implementation of a standard such as ISO 27001 can often result in greater security awareness within an organization.
Because implementation of ISO 27001 (and the other ISO 27000 standards) tends to involve both business management and technical staff, greater IT and Business alignment often results.
It might seem odd to list this as the first benefit, but it often shows the quickest “return on investment” – if an organization must comply to various regulations regarding data protection, privacy and IT governance (particularly if it is a financial, health or government organization), then ISO 27001 can bring in the methodology which enables to do it in the most efficient way.
In a market which is more and more competitive, it is sometimes very difficult to find something that will differentiate you in the eyes of your customers. ISO 27001 could be indeed a unique selling point, especially if you handle clients’ sensitive information.
Lowering the expenses
Information security is usually considered as a cost with no obvious financial gain. However, there is financial gain if you lower your expenses caused by incidents. You probably do have interruption in service, or occasional data leakage, or disgruntled employees. Or disgruntled former employees.
The truth is, there is still no methodology and/or technology to calculate how much money you could save if you prevented such incidents. But it always sounds good if you bring such cases to management’s attention.
Putting your business in order
This one is probably the most underrated – if you are a company which has been growing sharply for the last few years, you might experience problems like – who has to decide what, who is responsible for certain information assets, who has to authorize access to information systems etc.
How to achieve ISO 27001 certification – ISO 27001 implementation / Certification steps
Lakshy Management Consultant Pvt Ltd. offers a well defined and globally proven implementation methodology for ISO 27001-2013 certification.
- Gap Analysis
- Awareness Training
- Risk analysis
- Documentation Design and finalization
- Internal Auditor Training and conduct of internal audit
- Management Review Meeting
- Review of Implementation
- Pre-assessment audit
- Stage 1 – certification audit
- Stage 2 – certification audit
- Award of ISO 27001 certification
- Continual improvement of the system through value added consulting and training services
What are the requirements of ISO 27001 standard ?
Documentation is an important element of any management system because it clarifies the management processes and activities for users of the system and interested parties. Intention of ISMS is to bring information security under management control in order to ensure that it satisfies and is maintained to continue satisfying the organization’s information protection requirements.
Following are the documents that are mandated by the ISO27001 Standard in order to undergo certification audit.
Sec. 4.3 – Documentation Requirement(s)
Sec. 4.3.1 – General Documentation
- Records of Key Management Decisions regarding ISMS – Minutes of Management Meeting, Investment Decisions, Mandating of Policies, Business Expansion Decisions, Reports, etc.
- Information Security Policy Set – ISMS Policy, Information Security Policy
- Scope of ISMS – ISMS Scope
- Procedures and Controls in Support of the ISMS – Information Security Procedures, Controls Documentation
- Risk Management Practices in Support of the ISMS – Risk Assessment Methods, Risk Assessment Reports, Risk Treatment Plan
- Documented procedures to ensure effective planning, operation and control of its information security process and to measure effectiveness of controls – ISMS Operating Procedures, Information Security Metrics
- Records required by ISO27001 – user authorization(s) records, system security logs, change authorization records, etc.
- Statement of Applicability – Statement Of Applicability
Sec. 4.3.2 – Control Of Documents
- Document Control and Protection Procedures – Document Control Procedure
Sec. 4.3.3 – Control Of Records
- Controls needed for identification, storage, protection, retrieval, retention, and disposition of records shall be documented and implemented – Records Control Procedure
Sec. 5.0 – Management Responsibility
Sec. 5.2.2 – Record Maintenance
- Records of Education, Training, Skills, Experience and Qualifications – Security Awareness, Training and Education records, Information Security Awareness materials, Training evaluation/ feedback reports, etc.
Sec. 6.0 – Internal ISMS Audits
- Documented Internal IS Audit Plans and Procedures, ISMS Audit Reports, Agreed action plans, follow-up/verification/closure reports.
Sec. 7.0 – Management Review of the ISMS
- Management review plans and reports
Sec. 8.2 – Corrective Action
- Documented corrective action procedure
Sec. 8.3 – Preventive Action
- Documented preventive action procedure
11 Domains of ISO/IEC – 27001
- Security policy
- Organization of information security
- Asset management
- Human resources security
- Physical and environmental security
- Communications and operations management
- Access control
- Information systems acquisition, development and maintenance
- Information security incident management
- Business continuity management
What we offer in the field of ISO 27001 standard implementation and certification
As one of the largest ISO 27001 information security management system certification consulting companies across the world with clients in more than 40 countries, our knowledge and experience of the standards is unsurpassed. We understand how to fully exploit the benefits of your information security management system to ensure you unlock the true potential in your organization.
We provide unmatched expertise and technical competence to ensure that your ISO 27001 ISMS certification project adds value to your organization.
We provide consulting, training, internal audits, pre assessment audits and facilitation during ISO 27001 certification audit.
We offer our global knowledge moulded locally to bring in the best results for our clients and partner their journey of standardization, compliance, growth, success and continual improvements.
Contact us now, to get your organization ISO 27001 certified in the most effective and efficient manner while realizing the true benefits of the certification using our specialized ISMS implementation methodology that is less time consuming, fast, easy to understand and implement, result oriented, time bound and cost effective. Get ISO 27001 certified now with us….