SlideShare a Scribd company logo
1 of 9
ISO 27001: 2013 Standard
Documentation, Implementation and Audit Requirements classified
Clause Description Documentation Requirements Implementation Requirements Audit Requirements
4 Context of the organization
4.1
Understanding the
organization and
its context
‘About the Organization’ in the IS
Policy document
Understand the organization, its
nature of business and defining it
in the IS Policy document.
Review the IS Policy
document
4.2
Understanding the
needs and
expectations of
interested parties
‘Target Audience’ in the IS Policy
document
Brainstorming with Management
and including it in the IS Policy
document.
Review the IS Policy
document
4.3
Determining the
scope of the ISMS
‘ISMS Scope’ in the IS Policy
document
Brainstorming with Management
and including it in the IS Policy
document.
Review the IS Policy
document
4.4 ISMS The IS Policy document
 Establishment of IS
 Appointment of IS Manager
 Conducting IS Trainings and
Awareness
 Defining RACI
Review the IS Policy
document
Clause Description Documentation Requirements Implementation Requirements Audit Requirements
5 Leadership
5.1
Leadership and
commitment
ISMS budget allocations,
Assignment of competent IS
Manager and required staff
 Approval of the IS Policy
 Allocation of funds
 Appointment of IS Manager
and other IS roles
 Review and approval of ISMS
changes
 Review of ISMS performance
 Check for ISMS
head in budget
 Identify IS
Manager
 Board approval
for ISMS
implementation
activities
5.2 Policy IS Policy Development of the IS Policy
Review the IS Policy
document
5.3
Organizational
roles,
responsibilities
and authorities
 Appointment of IS Manager
and required staff
 Defining ISMS reporting
structure
 Defining RACI
 IS responsibilities in
Employee JD
 Appointment of IS Manager
and required competent staff
 Development of ISMS
reporting line
 Development of RACI
 Defining employee common
IS responsibilities
 Identify IS
Manager
 Review ISMS
reporting
structure
 Review ISMS RACI
 Review
Employment
documents
Clause Description Documentation Requirements Implementation Requirements Audit Requirements
6 Planning
6.1
Actions to address
risks and
opportunities
- - -
6.1.1 General
ISMS Risk Management
Methodology
Defining and documenting ISMS
Risk Management Methodology
Review ISMS Risk
Management
Methodology
6.1.2
IS Risk
Assessment
 Define Risk Assessment
Process
 List of Risk Owners
Develop and document Risk
Assessment Process including
defining risk acceptance criteria,
identifying risk owners
Review Risk
Assessment Process
6.1.3 IS Risk Treatment
Define Risk Treatment Process
and SoA
Develop and document Risk
Treatment Process including
development of SoA
Review Risk
Treatment Process
6.2
IS Objectives and
planning to
achieve them
Objectives in the IS Policy
document
Defining IS objectives of relevant
functions and levels of the
organization
Review IS Policy
Clause Description Documentation Requirements Implementation Requirements Audit Requirements
7 Support
7.1 Resources
 Appointment of required
ISMS staff
 Allocation of budget
 Conducting Management
Reviews
Appointment of IS Manager, IS
training and awareness
 Identify ISMS Staff
 Review ISMS staff
responsibilities
7.2 Competence
 IS Manager Job Description
 IS Staff qualifications and
experience
 Appointment of competent IS
Manager and required staff
 Review IS
Manager and staff
qualifications
7.3 Awareness
IS Training and Awareness
activities (training materials,
schedules, assessments,
appreciations)
 Conducting staff IS Training
and awareness activities
Review staff IS
Training and
Awareness activities
7.4 Communication
List of ISMS Interested Parties,
and Communication Plan
 Identify and list ISMS
Interested parties
 Gather communication
requirements and develop a
plan
Review list of
interested parties and
ISMS Communications
Plan
7.5
Documented
Information
- - -
Clause Description Documentation Requirements Implementation Requirements Audit Requirements
7.5.1 General
All documents identified as
necessary by the ISO and
Organization
7.5.2
Creating and
Updating
 ISMS Documentation Process
 Revision/Document History
to be included in all ISMS
documentation
 Document distribution List
Define ISMS Documentation
process
 Review ISMS
Documentation
process
 Check for
Revision/Docume
nt History in ISMS
documentation
7.5.3
Control of
documented
information
 List of all ISMS related
Documents (policies,
processes, procedures) and
Records (Decisions, Change
Records, Communications,
Reports, Alerts, Logs)
 Data Labeling process
(distribution and access)
 Data Retention & Archival
process
 Adding Revision/Document
History for all ISMS
documents (Labeling,
Version control, list of
changes)
 Identification and gathering of
all ISMS related documents
and records
 Defining controls for
developing and maintaining
documented information –
including Revision/Document
History, labeling, distribution,
access, versioning and
changes
 Review of ISMS
Documents and
Records
 Review
documents
labeling,
distribution,
version and
change details
Clause Description Documentation Requirements Implementation Requirements Audit Requirements
8 Operation
8.1
Operational
planning and
control
 Documents related to the IS
operational plans, processes,
procedures, actions
implemented
 ISMS Change Register
 IS Communications, logs and
reports
 Third party security reports
Identification of ISMS Operational
plans and control activities
Review ISMS
operations and control
activities
8.2
IS Risk
Assessment
Risk Assessment Reports Conducting Risk Assessment
Review of periodic IS
Risk Assessment
reports
8.3 IS Risk Treatment
Risk Treatment plans, actions
and results
Implementing Risk Treatment
activities
Review of IS Risk
Treatment plans,
actions and results
9 Performance Evaluation
Clause Description Documentation Requirements Implementation Requirements Audit Requirements
9.1
Monitoring,
measurement,
analysis and
evaluation
Documents, logs, periodic reports
on IS Risks, Incidents and
Changes
 Identifying various IS Metrics
to be monitored and
measured.
 Assigning monitoring
responsibilities to the
competent staff
Review reports on
various ISMS metrics,
and measurements
9.2 Internal Audit Periodic Internal Audit Reports
Defining Internal Audit Plans and
procedures (including defining
Audit Criteria (ISO 27001),
conducting Internal Audits
periodically and reporting to
Management)
Review Internal Audit
reports and results
9.3
Management
Review
MR Meeting minutes/decision
related to ISMS.
 Ensuring Management
reviews ISMS performance
periodically
 Management conducting
periodic reviews on ISMS
performance, status of
previous issues, risk
assessments reports, Audits,
NCs, Corrective actions, and
feedback)
 Review ISMS
performance
reviews
 Review results of
MRs (Corrective
actions)
10 Improvement
Clause Description Documentation Requirements Implementation Requirements Audit Requirements
10.1
Nonconformity
and corrective
action
ISO 27001 ISMS NC Register
along with corrective action
details.
 Developing and maintaining
an NC Register
 Defining procedures for ISMS
NC corrective actions
Review ISO ISMS NC
Register and status of
corrective actions and
its results.
10.2
Continual
improvement
Periodic Risk Assessments
reports, Audit reports, MRs and
feedbacks.
 Defining processes for
deriving ISMS improvements
through periodic risk
assessments, internal and
external audits, periodic MRs
and interested parties
feedback
 Adding improvements to the
ISMS policies, processes and
procedures
Review ISMS continual
improvement on the
basis of risk
assessments, pervious
audits reports, MRs
and feedback.
The ISO 27001:2013 standard does not require the organizations to prepare a separate ISMS policy explicitly. However, the
organizations can prepare it if they want. The organizations already having both IS Policy and ISMS Policy can continue or merge into
one single IS Policy document with minor changes.
About IS vs ISMS
Information security (IS) is achieved through the implementation of an applicable set of controls. The controls are selected through the
chosen risk management process and managed using an ISMS (Information Security Management System). The ISMS includes policies,
processes, procedures, organizational structures, software and hardware to protect the identified information assets.
- According to ISO 27000:2012 ISMS Vocabulary Document
About IS Policy Vs ISMS Policy
IS Policy is the responsibility of the Board / Senior Management. ISMS Policy is the responsibility of Executive Management. The board
delegate IS responsibilities to the Management, which are achieved effective through establishing, operating, monitoring, reviewing,
maintaining and improving the ISMS.
- Explained in the PECB ISO 27001 Lead Implementer Course Material

More Related Content

What's hot

Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001Imran Ahmed
 
ISO/IEC 27001:2022 Transition Arragements
ISO/IEC 27001:2022 Transition ArragementsISO/IEC 27001:2022 Transition Arragements
ISO/IEC 27001:2022 Transition ArragementsISONIKELtd
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdfControlCase
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfControlCase
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013scttmcvy
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementationRalf Braga
 
ISO 27001:2013 Mandatory documents and records
ISO 27001:2013 Mandatory documents and recordsISO 27001:2013 Mandatory documents and records
ISO 27001:2013 Mandatory documents and recordsManoj Vakekattil
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListSriramITISConsultant
 

What's hot (20)

Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO/IEC 27001:2022 Transition Arragements
ISO/IEC 27001:2022 Transition ArragementsISO/IEC 27001:2022 Transition Arragements
ISO/IEC 27001:2022 Transition Arragements
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
Iso 27001 2013
Iso 27001 2013Iso 27001 2013
Iso 27001 2013
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
ISO 27001:2013 Mandatory documents and records
ISO 27001:2013 Mandatory documents and recordsISO 27001:2013 Mandatory documents and records
ISO 27001:2013 Mandatory documents and records
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_List
 
Infosec Audit Lecture_4
Infosec Audit Lecture_4Infosec Audit Lecture_4
Infosec Audit Lecture_4
 

Similar to Iso 27001 2013 Standard Requirements

Chap1 2007 Cisa Review Course
Chap1 2007 Cisa Review CourseChap1 2007 Cisa Review Course
Chap1 2007 Cisa Review CourseDesmond Devendran
 
Chap1 2007cisareviewcourse-090511232029-phpapp02
Chap1 2007cisareviewcourse-090511232029-phpapp02Chap1 2007cisareviewcourse-090511232029-phpapp02
Chap1 2007cisareviewcourse-090511232029-phpapp02Waqas Ahmad
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Yerlin Sturdivant
 
Auditing Information Security Management System Using ISO 27001 2013
Auditing Information Security Management System Using ISO 27001 2013Auditing Information Security Management System Using ISO 27001 2013
Auditing Information Security Management System Using ISO 27001 2013Andrea Porter
 
Iso27001 Audit Services
Iso27001 Audit ServicesIso27001 Audit Services
Iso27001 Audit Servicesmcloete
 
ISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptxISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptxNapoleon NV
 
ISO Implementation Roadmap- By Motaharul Islam
ISO Implementation Roadmap- By Motaharul IslamISO Implementation Roadmap- By Motaharul Islam
ISO Implementation Roadmap- By Motaharul IslamMotaharul Islam
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.pptHasnolAhmad2
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramTammy Clark
 
ISO 9000 & ISO 14000: pptx..............
ISO 9000 & ISO 14000: pptx..............ISO 9000 & ISO 14000: pptx..............
ISO 9000 & ISO 14000: pptx..............GayatriBahatkar1
 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxSIS Certifications Pvt Ltd
 
ISO 9001:2015 Introduction & Awareness Training
ISO  9001:2015 Introduction & Awareness Training ISO  9001:2015 Introduction & Awareness Training
ISO 9001:2015 Introduction & Awareness Training Sadanand Borade
 
Upload iso 9001 2015 presentation
Upload iso 9001 2015 presentationUpload iso 9001 2015 presentation
Upload iso 9001 2015 presentationRajeesh Thumpayil
 
Process Audit and ISO
Process Audit and ISOProcess Audit and ISO
Process Audit and ISOSadafhazel
 
Auditing Standard and Practice
Auditing Standard and Practice Auditing Standard and Practice
Auditing Standard and Practice Bikash Kumar
 
QESH Training slides with Check list for
QESH Training slides with Check list forQESH Training slides with Check list for
QESH Training slides with Check list forGobiNava1
 

Similar to Iso 27001 2013 Standard Requirements (20)

Chap1 2007 Cisa Review Course
Chap1 2007 Cisa Review CourseChap1 2007 Cisa Review Course
Chap1 2007 Cisa Review Course
 
Chap1 2007cisareviewcourse-090511232029-phpapp02
Chap1 2007cisareviewcourse-090511232029-phpapp02Chap1 2007cisareviewcourse-090511232029-phpapp02
Chap1 2007cisareviewcourse-090511232029-phpapp02
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 
Auditing Information Security Management System Using ISO 27001 2013
Auditing Information Security Management System Using ISO 27001 2013Auditing Information Security Management System Using ISO 27001 2013
Auditing Information Security Management System Using ISO 27001 2013
 
Iso27001 Audit Services
Iso27001 Audit ServicesIso27001 Audit Services
Iso27001 Audit Services
 
ISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptxISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptx
 
ISO Implementation Roadmap- By Motaharul Islam
ISO Implementation Roadmap- By Motaharul IslamISO Implementation Roadmap- By Motaharul Islam
ISO Implementation Roadmap- By Motaharul Islam
 
Isms
IsmsIsms
Isms
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security Program
 
ISO 9000 & ISO 14000: pptx..............
ISO 9000 & ISO 14000: pptx..............ISO 9000 & ISO 14000: pptx..............
ISO 9000 & ISO 14000: pptx..............
 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
 
ISO 9001:2015 Introduction & Awareness Training
ISO  9001:2015 Introduction & Awareness Training ISO  9001:2015 Introduction & Awareness Training
ISO 9001:2015 Introduction & Awareness Training
 
ISO 45001 audit tool
ISO 45001 audit toolISO 45001 audit tool
ISO 45001 audit tool
 
Upload iso 9001 2015 presentation
Upload iso 9001 2015 presentationUpload iso 9001 2015 presentation
Upload iso 9001 2015 presentation
 
Process Audit and ISO
Process Audit and ISOProcess Audit and ISO
Process Audit and ISO
 
Auditing Standard and Practice
Auditing Standard and Practice Auditing Standard and Practice
Auditing Standard and Practice
 
Activities of the International Auditing & Assurance Standards Board
Activities of the International Auditing & Assurance Standards Board Activities of the International Auditing & Assurance Standards Board
Activities of the International Auditing & Assurance Standards Board
 
ISO 9000 & ISO 14000
ISO 9000 & ISO 14000ISO 9000 & ISO 14000
ISO 9000 & ISO 14000
 
QESH Training slides with Check list for
QESH Training slides with Check list forQESH Training slides with Check list for
QESH Training slides with Check list for
 

Recently uploaded

9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 

Recently uploaded (20)

9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 

Iso 27001 2013 Standard Requirements

  • 1. ISO 27001: 2013 Standard Documentation, Implementation and Audit Requirements classified Clause Description Documentation Requirements Implementation Requirements Audit Requirements 4 Context of the organization 4.1 Understanding the organization and its context ‘About the Organization’ in the IS Policy document Understand the organization, its nature of business and defining it in the IS Policy document. Review the IS Policy document 4.2 Understanding the needs and expectations of interested parties ‘Target Audience’ in the IS Policy document Brainstorming with Management and including it in the IS Policy document. Review the IS Policy document 4.3 Determining the scope of the ISMS ‘ISMS Scope’ in the IS Policy document Brainstorming with Management and including it in the IS Policy document. Review the IS Policy document 4.4 ISMS The IS Policy document  Establishment of IS  Appointment of IS Manager  Conducting IS Trainings and Awareness  Defining RACI Review the IS Policy document
  • 2. Clause Description Documentation Requirements Implementation Requirements Audit Requirements 5 Leadership 5.1 Leadership and commitment ISMS budget allocations, Assignment of competent IS Manager and required staff  Approval of the IS Policy  Allocation of funds  Appointment of IS Manager and other IS roles  Review and approval of ISMS changes  Review of ISMS performance  Check for ISMS head in budget  Identify IS Manager  Board approval for ISMS implementation activities 5.2 Policy IS Policy Development of the IS Policy Review the IS Policy document 5.3 Organizational roles, responsibilities and authorities  Appointment of IS Manager and required staff  Defining ISMS reporting structure  Defining RACI  IS responsibilities in Employee JD  Appointment of IS Manager and required competent staff  Development of ISMS reporting line  Development of RACI  Defining employee common IS responsibilities  Identify IS Manager  Review ISMS reporting structure  Review ISMS RACI  Review Employment documents
  • 3. Clause Description Documentation Requirements Implementation Requirements Audit Requirements 6 Planning 6.1 Actions to address risks and opportunities - - - 6.1.1 General ISMS Risk Management Methodology Defining and documenting ISMS Risk Management Methodology Review ISMS Risk Management Methodology 6.1.2 IS Risk Assessment  Define Risk Assessment Process  List of Risk Owners Develop and document Risk Assessment Process including defining risk acceptance criteria, identifying risk owners Review Risk Assessment Process 6.1.3 IS Risk Treatment Define Risk Treatment Process and SoA Develop and document Risk Treatment Process including development of SoA Review Risk Treatment Process 6.2 IS Objectives and planning to achieve them Objectives in the IS Policy document Defining IS objectives of relevant functions and levels of the organization Review IS Policy
  • 4. Clause Description Documentation Requirements Implementation Requirements Audit Requirements 7 Support 7.1 Resources  Appointment of required ISMS staff  Allocation of budget  Conducting Management Reviews Appointment of IS Manager, IS training and awareness  Identify ISMS Staff  Review ISMS staff responsibilities 7.2 Competence  IS Manager Job Description  IS Staff qualifications and experience  Appointment of competent IS Manager and required staff  Review IS Manager and staff qualifications 7.3 Awareness IS Training and Awareness activities (training materials, schedules, assessments, appreciations)  Conducting staff IS Training and awareness activities Review staff IS Training and Awareness activities 7.4 Communication List of ISMS Interested Parties, and Communication Plan  Identify and list ISMS Interested parties  Gather communication requirements and develop a plan Review list of interested parties and ISMS Communications Plan 7.5 Documented Information - - -
  • 5. Clause Description Documentation Requirements Implementation Requirements Audit Requirements 7.5.1 General All documents identified as necessary by the ISO and Organization 7.5.2 Creating and Updating  ISMS Documentation Process  Revision/Document History to be included in all ISMS documentation  Document distribution List Define ISMS Documentation process  Review ISMS Documentation process  Check for Revision/Docume nt History in ISMS documentation 7.5.3 Control of documented information  List of all ISMS related Documents (policies, processes, procedures) and Records (Decisions, Change Records, Communications, Reports, Alerts, Logs)  Data Labeling process (distribution and access)  Data Retention & Archival process  Adding Revision/Document History for all ISMS documents (Labeling, Version control, list of changes)  Identification and gathering of all ISMS related documents and records  Defining controls for developing and maintaining documented information – including Revision/Document History, labeling, distribution, access, versioning and changes  Review of ISMS Documents and Records  Review documents labeling, distribution, version and change details
  • 6. Clause Description Documentation Requirements Implementation Requirements Audit Requirements 8 Operation 8.1 Operational planning and control  Documents related to the IS operational plans, processes, procedures, actions implemented  ISMS Change Register  IS Communications, logs and reports  Third party security reports Identification of ISMS Operational plans and control activities Review ISMS operations and control activities 8.2 IS Risk Assessment Risk Assessment Reports Conducting Risk Assessment Review of periodic IS Risk Assessment reports 8.3 IS Risk Treatment Risk Treatment plans, actions and results Implementing Risk Treatment activities Review of IS Risk Treatment plans, actions and results 9 Performance Evaluation
  • 7. Clause Description Documentation Requirements Implementation Requirements Audit Requirements 9.1 Monitoring, measurement, analysis and evaluation Documents, logs, periodic reports on IS Risks, Incidents and Changes  Identifying various IS Metrics to be monitored and measured.  Assigning monitoring responsibilities to the competent staff Review reports on various ISMS metrics, and measurements 9.2 Internal Audit Periodic Internal Audit Reports Defining Internal Audit Plans and procedures (including defining Audit Criteria (ISO 27001), conducting Internal Audits periodically and reporting to Management) Review Internal Audit reports and results 9.3 Management Review MR Meeting minutes/decision related to ISMS.  Ensuring Management reviews ISMS performance periodically  Management conducting periodic reviews on ISMS performance, status of previous issues, risk assessments reports, Audits, NCs, Corrective actions, and feedback)  Review ISMS performance reviews  Review results of MRs (Corrective actions) 10 Improvement
  • 8. Clause Description Documentation Requirements Implementation Requirements Audit Requirements 10.1 Nonconformity and corrective action ISO 27001 ISMS NC Register along with corrective action details.  Developing and maintaining an NC Register  Defining procedures for ISMS NC corrective actions Review ISO ISMS NC Register and status of corrective actions and its results. 10.2 Continual improvement Periodic Risk Assessments reports, Audit reports, MRs and feedbacks.  Defining processes for deriving ISMS improvements through periodic risk assessments, internal and external audits, periodic MRs and interested parties feedback  Adding improvements to the ISMS policies, processes and procedures Review ISMS continual improvement on the basis of risk assessments, pervious audits reports, MRs and feedback.
  • 9. The ISO 27001:2013 standard does not require the organizations to prepare a separate ISMS policy explicitly. However, the organizations can prepare it if they want. The organizations already having both IS Policy and ISMS Policy can continue or merge into one single IS Policy document with minor changes. About IS vs ISMS Information security (IS) is achieved through the implementation of an applicable set of controls. The controls are selected through the chosen risk management process and managed using an ISMS (Information Security Management System). The ISMS includes policies, processes, procedures, organizational structures, software and hardware to protect the identified information assets. - According to ISO 27000:2012 ISMS Vocabulary Document About IS Policy Vs ISMS Policy IS Policy is the responsibility of the Board / Senior Management. ISMS Policy is the responsibility of Executive Management. The board delegate IS responsibilities to the Management, which are achieved effective through establishing, operating, monitoring, reviewing, maintaining and improving the ISMS. - Explained in the PECB ISO 27001 Lead Implementer Course Material