SlideShare a Scribd company logo
1 of 12
iFour ConsultancyISO 27001 – A8 Asset Management
 Anything that has value to the organization
Asset
ISO for Software application development India
Assets
Software &
Hardware
Infrastructure
Information
People
Risk
assessment
• Key element of identifying risks, together with threats and
vulnerabilities.
Responsibility
Assignment
• Defines asset owners
• Assigns owners the responsibility to protect the
confidentiality, integrity and availability of the information
Why are assets important for information security management?
ISO for Software application development India
 A set of business processes designed to manage the lifecycle and inventory of
technology assets
 It provides:
 Lowers IT costs,
 Reduces IT risk and
 Improves productivity
Asset Management
A8 Asset Management Clauses
ISO for Software application development India
• Responsibility for assets8.1
• Information Classification8.2
• Media Handling8.3
 To identify organizational assets and define appropriate protection responsibility
8.1.1 Inventory of Assets
8.1.2 Ownership of assets
8.1.3 Acceptable use of assets
8.1.4 Return of Assets
8.1 Responsibility for assets
ISO for Software application development India
Controls for Responsibility for assets
• Assets associated with information and information processing facilities shall
be identified and an inventory of these assets shall be drawn up and
maintained
Inventory of Assets
• Assets maintained in the inventory shall be ownedOwnership of assets
• Rules for acceptable use of information and of assets associated with
information and information processing facilities shall be identified,
documented and implemented
Acceptable use of
assets
• All employees and external party users shall return all of the organizational
assets in their possession upon termination of their employment, contract or
agreement
Return of Assets
 To ensure that information receives an appropriate level of protection in
accordance with its importance to the organization
8.2.1 Classification of information
8.2.2 Labelling of information
8.2.3 Handling of assets
8.2 Information Classification
ISO for Software application development India
Controls for Information Classification
ISO for Software application development India
• Information shall be classified in terms of legal requirements,
value, criticality and sensitivity to unauthorised disclosure or
modification
Classification of
information
• An appropriate set of procedures for information labelling shall
be developed and implemented in accordance with information
classification scheme adopted by the organization
Labelling of
information
• Procedures for handling assets shall be developed and
implemented in accordance with the information classification
scheme adopted by the organization
Handling of assets
References
http://advisera.com/27001academy/knowledgebase/how-to-handle-asset-
register-asset-inventory-according-to-iso-27001/
https://en.wikipedia.org/wiki/ISO/IEC_27001:2013
ISO for Software application development India
Visit- http://www.ifour-consultancy.com
Or
http://www.ifourtechnolab.com
For more details
ISO for Software application development India
ISO for Software application development India

More Related Content

Viewers also liked

Iso 9001:2015 Documented Information Guidance
Iso 9001:2015 Documented Information GuidanceIso 9001:2015 Documented Information Guidance
Iso 9001:2015 Documented Information GuidanceMohammad Elshahat
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
إيزو 9001/2015 باللغة العربية
إيزو 9001/2015 باللغة العربيةإيزو 9001/2015 باللغة العربية
إيزو 9001/2015 باللغة العربيةBaraket Mohamed
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 

Viewers also liked (8)

Iso 9001:2015 Documented Information Guidance
Iso 9001:2015 Documented Information GuidanceIso 9001:2015 Documented Information Guidance
Iso 9001:2015 Documented Information Guidance
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
إيزو 9001/2015 باللغة العربية
إيزو 9001/2015 باللغة العربيةإيزو 9001/2015 باللغة العربية
إيزو 9001/2015 باللغة العربية
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Risk management
Risk managementRisk management
Risk management
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 

Recently uploaded (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

ISO 27001 A8 Asset Management

  • 1. iFour ConsultancyISO 27001 – A8 Asset Management
  • 2.  Anything that has value to the organization Asset ISO for Software application development India Assets Software & Hardware Infrastructure Information People
  • 3. Risk assessment • Key element of identifying risks, together with threats and vulnerabilities. Responsibility Assignment • Defines asset owners • Assigns owners the responsibility to protect the confidentiality, integrity and availability of the information Why are assets important for information security management? ISO for Software application development India
  • 4.  A set of business processes designed to manage the lifecycle and inventory of technology assets  It provides:  Lowers IT costs,  Reduces IT risk and  Improves productivity Asset Management
  • 5. A8 Asset Management Clauses ISO for Software application development India • Responsibility for assets8.1 • Information Classification8.2 • Media Handling8.3
  • 6.  To identify organizational assets and define appropriate protection responsibility 8.1.1 Inventory of Assets 8.1.2 Ownership of assets 8.1.3 Acceptable use of assets 8.1.4 Return of Assets 8.1 Responsibility for assets ISO for Software application development India
  • 7. Controls for Responsibility for assets • Assets associated with information and information processing facilities shall be identified and an inventory of these assets shall be drawn up and maintained Inventory of Assets • Assets maintained in the inventory shall be ownedOwnership of assets • Rules for acceptable use of information and of assets associated with information and information processing facilities shall be identified, documented and implemented Acceptable use of assets • All employees and external party users shall return all of the organizational assets in their possession upon termination of their employment, contract or agreement Return of Assets
  • 8.  To ensure that information receives an appropriate level of protection in accordance with its importance to the organization 8.2.1 Classification of information 8.2.2 Labelling of information 8.2.3 Handling of assets 8.2 Information Classification ISO for Software application development India
  • 9. Controls for Information Classification ISO for Software application development India • Information shall be classified in terms of legal requirements, value, criticality and sensitivity to unauthorised disclosure or modification Classification of information • An appropriate set of procedures for information labelling shall be developed and implemented in accordance with information classification scheme adopted by the organization Labelling of information • Procedures for handling assets shall be developed and implemented in accordance with the information classification scheme adopted by the organization Handling of assets
  • 11. Visit- http://www.ifour-consultancy.com Or http://www.ifourtechnolab.com For more details ISO for Software application development India
  • 12. ISO for Software application development India

Editor's Notes

  1. ISO for Software application development India - http://www.ifour-consultancy.com/
  2. ISO for Software application development India - http://www.ifour-consultancy.com/
  3. ISO for Software application development India - http://www.ifour-consultancy.com/
  4. ISO for Software application development India - http://www.ifour-consultancy.com/
  5. ISO for Software application development India - http://www.ifour-consultancy.com/
  6. ISO for Software application development India - http://www.ifour-consultancy.com/
  7. ISO for Software application development India - http://www.ifour-consultancy.com/
  8. ISO for Software application development India - http://www.ifour-consultancy.com/
  9. ISO for Software application development India - http://www.ifour-consultancy.com/