SlideShare a Scribd company logo
1 of 19
DIGIT
Directorate-General for Informatics
DIGIT
Directorate-General for Informatics
ISO 27k security
standards
What does it mean for
ECI?
29 November 2012
DIGIT
Directorate-General for Informatics
Legal base
• Regulation (EU) No 211/2011 of the European Parliament
and of the Council of 16 February 2011 on the citizens'
initiative
• Commission Implementing Regulation (EU) No 1179/2011
of 17 November 2011 laying down technical
specifications for online collection systems pursuant to
Regulation (EU) No 211/2011 of the European Parliament
and of the Council on the citizens' initiative
DIGIT
Directorate-General for Informatics
(EU) No 211/2011
3
Article 6 Online collection systems
1. Where statements of support are collected online,
the data obtained through the online collection
system shall be stored in the territory of a Member
State.
The online collection system shall be certified in
accordance with paragraph 3 in the Member State in
which the data collected through the online
collection system will be stored.
DIGIT
Directorate-General for Informatics
(EU) No 211/2011 (ctd.)
4
Article 6 Online collection systems
4. Online collection systems shall have adequate
security and technical features in place in order to
ensure that:
a) only natural persons may submit a statement of
support form online;
b) the data provided online are securely collected and
stored,
c) the system can generate statements of support in a
form complying with the models set out in Annex III
DIGIT
Directorate-General for Informatics
(EU) No 1179/2011
5
Provides technical specifications to address Article 6(4)
of REGULATION (EU) No 211/2011.
 (a) and (c) are addressed by the Online Collection
Software provided by the European Commission
(Section 1 and 3 of the annex)
 (b) is addressed in section 2 of the annex that details
requirements which
 have to be addressed by the Organisers
 are addressed by the Online Collection Software provided
by the European Commission
 have to be addressed by the hosting infrastructure
DIGIT
Directorate-General for Informatics
(EU) No 1179/2011 (ctd.)
6
Section 2 of the annex provides technical specifications
for the following domains:
• Information assurance standards (→ Organisers)
• Functional requirements (→ OCS)
• Application level security (→ OCS + hosting
infrastructure)
• Database security and data integrity (→ OCS +
hosting infrastructure)
• Infrastructure security (→ hosting infrastructure)
• Organiser client security (→ Organisers)
DIGIT
Directorate-General for Informatics
7
July, 18th
DIGIT
Directorate-General for Informatics
EC as hosting provider … only?
8
The main objective was to
• provide a suitable hosting infrastructure
(compliant with 1179/2011 section 2
requirements)
However, it quickly appeared that EC could also help:
• in drafting documents required by 2.1 and 2.2
• in fulfilling Organiser client security requirements
(Live-DVD)
DIGIT
Directorate-General for Informatics
9
DIGIT
Directorate-General for Informatics
Information assurance standards
10
2.1. Organisers provide documentation showing that they
fulfil the requirements of standard ISO/IEC 27001, short
of adoption. For that purpose, they have:
a) performed a full risk assessment, …;
b)designed and implemented measures for treating
risks …;
c) identified the residual risks in writing;
d) provided the organisational means to receive feedback
on new threats and security improvements.
DIGIT
Directorate-General for Informatics
Information assurance standards (ctd)
11
2.2. Organisers choose security controls based on the risk
analysis in 2.1(a) from the following standards:
1) ISO/IEC 27002; or
2) the Information Security Forum’s ‘Standard of Good Practice’
to address the following issues:
a) risk assessments (ISO/IEC 27005 or another specific and
suitable risk assessment methodology are recommended);
b) physical and environmental security;
c) human resources security;
d) communications and operations management;
e) …
DIGIT
Directorate-General for Informatics
ISO 27000 security standards
• ISO 27001 formally specifies a management
system that is intended to bring information
security under explicit management control
ISO 27001
• ISO 27002 provides best practice
recommendations on information security
management for use by those responsible for
initiating, implementing or maintaining
Information Security Management Systems
(ISMS)
ISO 27002
DIGIT
Directorate-General for Informatics
ISO27002 domains
Information
Security
Policy
Information security
organization
Access control
Compliance
Physical and
environmental
security
Communications and
operations management
OPERATIONAL
Information
Security Policy
Risk
Assessment
ISMS Policy
Statement of
applicability
Information security
incident management
Business continuity
management
Personnel security
Asset
classification
and control
Systems development
and maintenance
DIGIT
Directorate-General for Informatics
ISO27001 ISMS
Perform a gap
analysis
Define / review
the security
perimeter
Perform risk
assessment
Obtain approval
Formulate risk
treatment plan
Update
information
security policy
Risk management
Prepare a
Statement of
Applicability
ISO
27001
PLAN
DO
ACT
CHECK
Implement the risk
treatment plan
and selected
controls
Implement
training and
awareness
programs
ISMS
Perform
Information
Security audits
Measure
effectiveness
DIGIT
Directorate-General for Informatics
ECI Documentation package
15
To fulfil the above requirements, EC agreed with the
Luxembourgish Authorities to build the following security
documentation package :
1. the Security Scope
2. the Business Impact Analysis (BIA)
3. the Risk Assessment Report (RAR)
4. the Risk Treatment Plan (including Residual Risks)
(RTP)
5. the Statement of Applicability (SoA)
DIGIT
Directorate-General for Informatics
ECI Documentation package (ctd)
16
EC also built guidance documents to help the Organisers
drafting their part of the security documentation, i.e.:
1. Organiser Risk Assessment Guidance
2. Organiser Risk Treatment Plan Guidance
3. Organiser Statement of Applicability Guidance
The guidance documents have been drafted to be
reusable as much as possible and thus to minimize
Organiser's documentation effort.
DIGIT
Directorate-General for Informatics
Organiser client security
17
2.20. Organiser client security
For the sake of end-to-end security, the organisers take
necessary measures to secure their client
application/ device that they use to manage and access
the online collection system, such as:
2.20.1. Users run non-maintenance tasks (such as office
automation) with the lowest set of privileges that they require
to run.
2.20.2. When relevant updates and patches of the OS, any
installed applications, or anti-malware become public, then
such updates or patches are installed expediently.
DIGIT
Directorate-General for Informatics
18
And finally …
DIGIT
Directorate-General for Informatics
Q&A

More Related Content

Similar to 04 ISO 27000 security standards.pptx

IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
genetics
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
PECB
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of things
najascj
 

Similar to 04 ISO 27000 security standards.pptx (20)

List of ISO27000-Family International Standards organisation.pdf
List of ISO27000-Family International Standards organisation.pdfList of ISO27000-Family International Standards organisation.pdf
List of ISO27000-Family International Standards organisation.pdf
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of things
 
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber SecurityISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
 
ECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification Framework
 
UNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - GuasconiUNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - Guasconi
 
Enisa report e idas compliant eid solution
Enisa report   e idas compliant eid solutionEnisa report   e idas compliant eid solution
Enisa report e idas compliant eid solution
 
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight LoggerCIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
 
Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
 
Towards a certification scheme for IoT security evaluation
Towards a certification scheme for IoT security evaluationTowards a certification scheme for IoT security evaluation
Towards a certification scheme for IoT security evaluation
 
NEC-IBM_Event_093015
NEC-IBM_Event_093015NEC-IBM_Event_093015
NEC-IBM_Event_093015
 
Session 2. CEF – digital service infrastructures, Joao Rodrigues Frade
Session 2. CEF – digital service infrastructures, Joao Rodrigues FradeSession 2. CEF – digital service infrastructures, Joao Rodrigues Frade
Session 2. CEF – digital service infrastructures, Joao Rodrigues Frade
 
Information security management system ISMS
Information security management system ISMSInformation security management system ISMS
Information security management system ISMS
 
Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016
Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016
Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
SCAPE general presentation
SCAPE general presentationSCAPE general presentation
SCAPE general presentation
 
vivotek_ipcctv_handbook.pdf
vivotek_ipcctv_handbook.pdfvivotek_ipcctv_handbook.pdf
vivotek_ipcctv_handbook.pdf
 
Day 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdfDay 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdf
 

Recently uploaded

一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
AS
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
F
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样
A
 
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
AS
 
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
Fir
 
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
Fir
 
@OBAT ABORSI 3 BULAN@ OBAT PENGGUGUR KANDUNGAN 3 BULAN (087776558899)
@OBAT ABORSI 3 BULAN@ OBAT PENGGUGUR KANDUNGAN 3 BULAN (087776558899)@OBAT ABORSI 3 BULAN@ OBAT PENGGUGUR KANDUNGAN 3 BULAN (087776558899)
@OBAT ABORSI 3 BULAN@ OBAT PENGGUGUR KANDUNGAN 3 BULAN (087776558899)
Obat Cytotec
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
AS
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
AS
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 

Recently uploaded (20)

APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样
 
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
 
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
 
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
 
@OBAT ABORSI 3 BULAN@ OBAT PENGGUGUR KANDUNGAN 3 BULAN (087776558899)
@OBAT ABORSI 3 BULAN@ OBAT PENGGUGUR KANDUNGAN 3 BULAN (087776558899)@OBAT ABORSI 3 BULAN@ OBAT PENGGUGUR KANDUNGAN 3 BULAN (087776558899)
@OBAT ABORSI 3 BULAN@ OBAT PENGGUGUR KANDUNGAN 3 BULAN (087776558899)
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
Dan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat HoodieDan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat Hoodie
 
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
TOP 100 Vulnerabilities Step-by-Step Guide HandbookTOP 100 Vulnerabilities Step-by-Step Guide Handbook
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirt
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303
 
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 

04 ISO 27000 security standards.pptx

  • 1. DIGIT Directorate-General for Informatics DIGIT Directorate-General for Informatics ISO 27k security standards What does it mean for ECI? 29 November 2012
  • 2. DIGIT Directorate-General for Informatics Legal base • Regulation (EU) No 211/2011 of the European Parliament and of the Council of 16 February 2011 on the citizens' initiative • Commission Implementing Regulation (EU) No 1179/2011 of 17 November 2011 laying down technical specifications for online collection systems pursuant to Regulation (EU) No 211/2011 of the European Parliament and of the Council on the citizens' initiative
  • 3. DIGIT Directorate-General for Informatics (EU) No 211/2011 3 Article 6 Online collection systems 1. Where statements of support are collected online, the data obtained through the online collection system shall be stored in the territory of a Member State. The online collection system shall be certified in accordance with paragraph 3 in the Member State in which the data collected through the online collection system will be stored.
  • 4. DIGIT Directorate-General for Informatics (EU) No 211/2011 (ctd.) 4 Article 6 Online collection systems 4. Online collection systems shall have adequate security and technical features in place in order to ensure that: a) only natural persons may submit a statement of support form online; b) the data provided online are securely collected and stored, c) the system can generate statements of support in a form complying with the models set out in Annex III
  • 5. DIGIT Directorate-General for Informatics (EU) No 1179/2011 5 Provides technical specifications to address Article 6(4) of REGULATION (EU) No 211/2011.  (a) and (c) are addressed by the Online Collection Software provided by the European Commission (Section 1 and 3 of the annex)  (b) is addressed in section 2 of the annex that details requirements which  have to be addressed by the Organisers  are addressed by the Online Collection Software provided by the European Commission  have to be addressed by the hosting infrastructure
  • 6. DIGIT Directorate-General for Informatics (EU) No 1179/2011 (ctd.) 6 Section 2 of the annex provides technical specifications for the following domains: • Information assurance standards (→ Organisers) • Functional requirements (→ OCS) • Application level security (→ OCS + hosting infrastructure) • Database security and data integrity (→ OCS + hosting infrastructure) • Infrastructure security (→ hosting infrastructure) • Organiser client security (→ Organisers)
  • 8. DIGIT Directorate-General for Informatics EC as hosting provider … only? 8 The main objective was to • provide a suitable hosting infrastructure (compliant with 1179/2011 section 2 requirements) However, it quickly appeared that EC could also help: • in drafting documents required by 2.1 and 2.2 • in fulfilling Organiser client security requirements (Live-DVD)
  • 10. DIGIT Directorate-General for Informatics Information assurance standards 10 2.1. Organisers provide documentation showing that they fulfil the requirements of standard ISO/IEC 27001, short of adoption. For that purpose, they have: a) performed a full risk assessment, …; b)designed and implemented measures for treating risks …; c) identified the residual risks in writing; d) provided the organisational means to receive feedback on new threats and security improvements.
  • 11. DIGIT Directorate-General for Informatics Information assurance standards (ctd) 11 2.2. Organisers choose security controls based on the risk analysis in 2.1(a) from the following standards: 1) ISO/IEC 27002; or 2) the Information Security Forum’s ‘Standard of Good Practice’ to address the following issues: a) risk assessments (ISO/IEC 27005 or another specific and suitable risk assessment methodology are recommended); b) physical and environmental security; c) human resources security; d) communications and operations management; e) …
  • 12. DIGIT Directorate-General for Informatics ISO 27000 security standards • ISO 27001 formally specifies a management system that is intended to bring information security under explicit management control ISO 27001 • ISO 27002 provides best practice recommendations on information security management for use by those responsible for initiating, implementing or maintaining Information Security Management Systems (ISMS) ISO 27002
  • 13. DIGIT Directorate-General for Informatics ISO27002 domains Information Security Policy Information security organization Access control Compliance Physical and environmental security Communications and operations management OPERATIONAL Information Security Policy Risk Assessment ISMS Policy Statement of applicability Information security incident management Business continuity management Personnel security Asset classification and control Systems development and maintenance
  • 14. DIGIT Directorate-General for Informatics ISO27001 ISMS Perform a gap analysis Define / review the security perimeter Perform risk assessment Obtain approval Formulate risk treatment plan Update information security policy Risk management Prepare a Statement of Applicability ISO 27001 PLAN DO ACT CHECK Implement the risk treatment plan and selected controls Implement training and awareness programs ISMS Perform Information Security audits Measure effectiveness
  • 15. DIGIT Directorate-General for Informatics ECI Documentation package 15 To fulfil the above requirements, EC agreed with the Luxembourgish Authorities to build the following security documentation package : 1. the Security Scope 2. the Business Impact Analysis (BIA) 3. the Risk Assessment Report (RAR) 4. the Risk Treatment Plan (including Residual Risks) (RTP) 5. the Statement of Applicability (SoA)
  • 16. DIGIT Directorate-General for Informatics ECI Documentation package (ctd) 16 EC also built guidance documents to help the Organisers drafting their part of the security documentation, i.e.: 1. Organiser Risk Assessment Guidance 2. Organiser Risk Treatment Plan Guidance 3. Organiser Statement of Applicability Guidance The guidance documents have been drafted to be reusable as much as possible and thus to minimize Organiser's documentation effort.
  • 17. DIGIT Directorate-General for Informatics Organiser client security 17 2.20. Organiser client security For the sake of end-to-end security, the organisers take necessary measures to secure their client application/ device that they use to manage and access the online collection system, such as: 2.20.1. Users run non-maintenance tasks (such as office automation) with the lowest set of privileges that they require to run. 2.20.2. When relevant updates and patches of the OS, any installed applications, or anti-malware become public, then such updates or patches are installed expediently.

Editor's Notes

  1. Strong captcha is suggested Annex section 2. OCS already address: 1, 2.3, 2.4, 2.5, 2.6, 2.7 (except §2.7.6.a, b, c and d, §2.7.9.a and c ), 2.11, 2.12, 2.13 and 2.14
  2. SCOPE: It defines the scope and the boundaries of the ISMS at Hosting side BIA: It assess the business impacts upon the organisation that might result from security failures RAR: It presents the results of the Risk Assessment for the ECI OCSI hosted at the premises of the European Commission RTP: Hosting Risk Treatment Plan SoA : It includes the controls selected from the ISO27002 standard and controls excluded by EC data centre and the reason for their exclusion.