Successfully reported this slideshow.



Published on

Introduction to Information Security Management System and ISO/IEC 27001:2005


  1. 1. - By Khushboo Khandelwal Business Analyst & (Certified BS ISO/IEC 27001:2005 Lead Auditor) -At iViZ Techno Solutions Pvt. Ltd.
  2. 2. <ul><li>PART-I </li></ul><ul><li>Knowledge (Audit Objectives ,Information ,ISM & ISMS) </li></ul><ul><li>Explain the purpose of an ISMS and the process for </li></ul><ul><li>-Establishing </li></ul><ul><li>-Implementing </li></ul><ul><li>-Operating </li></ul><ul><li>-Monitoring </li></ul><ul><li>-Reviewing </li></ul><ul><li>-Improving an ISMS </li></ul><ul><li>Explain the purpose and the contents of ISO 27001, ISO 27002, ISO 19011 and ISO 27006, and their interrelationship. </li></ul><ul><li>Benefits of an ISMS </li></ul>
  3. 3. <ul><li>To determine the conformity or non conformity of the management system elements with specified requirements </li></ul><ul><li>To determine the effectiveness of the implemented management system in meeting specified objectives </li></ul><ul><li>To provide the auditee with an opportunity to improve the management system. </li></ul>
  4. 4. <ul><li>“ Information is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably protected.” </li></ul><ul><li>Storing and Communicating information </li></ul><ul><li>Printed or written on paper </li></ul><ul><li>Stored Electronically </li></ul><ul><li>Transmitted by post or using electronic means </li></ul><ul><li>Shown on corporate videos </li></ul><ul><li>Verbal – spoken in conversations </li></ul><ul><li>‘……… .Whatever form the information takes, or means by which it is shared or stored , it should always be appropriately protected.’ </li></ul>
  5. 5. S Integrity Clause 3.8 of ISO/IEC Confidentiality Clause 3.3 of ISO/IEC 27001 Availability Clause 3.2 of ISO/IEC 27001 Information SECURITY SECURITY SECURITY SECURITY THREATS VULNERABILITIES RISKS Safeguarding the accuracy and completeness of information processing methods. Ensuring that information is accessible only to those authorized to have access. Ensuring that authorized users have access to information and associated assets when required .
  7. 7. Customer Outsourced
  8. 8. <ul><li>Information security protects information from a wide range of threats in order to ensure business continuity, minimize business damage, and maximize return on investment and business opportunities </li></ul><ul><li>Every organization will have a differing set of requirements in terms of controls and the level of confidentiality, integrity, and availability required </li></ul>
  9. 11. <ul><li>ISO/IEC 17799= BS 7799 Part I </li></ul><ul><li>- Code of Practice for Information Management practice </li></ul><ul><li>-Provides a Comprehensive sets of Security Controls. </li></ul><ul><li>-Based on Best Information Security Practices. </li></ul><ul><li>-It cannot be used for assessment and registration. </li></ul><ul><li>ISO 27001 = BS 7799 Part- 2 </li></ul><ul><li>- Specification for Information Security Management Systems </li></ul><ul><li>-Specifies requirements for establishing, implementing and documenting Information Security Management Systems (ISMS). </li></ul><ul><li>- Specifies requirements of Security Controls to be implemented. </li></ul><ul><li>- Can be used for assessment and registration. </li></ul>
  10. 12. <ul><li>Elevation to international Standard Status. </li></ul><ul><li>More Organization are expected to adopt it. </li></ul><ul><li>Clarifications and Improvements made by the International Organization for Standardization. </li></ul><ul><li>Definition alignment with other ISO standards </li></ul><ul><li>(such as ISO/IEC 13335- 1: 2004 and ISO /IEC TR 18044:2004) </li></ul>
  11. 15. <ul><li>An internationally recognized structured methodology dedicated to information security </li></ul><ul><li>A management process to evaluate, implement and maintain an Information Security Management System (ISMS) </li></ul><ul><li>A comprehensive set of controls comprised of best practices in information security </li></ul><ul><li>Applicable to all industry sectors </li></ul><ul><li>Emphasis on prevention </li></ul>
  12. 16. <ul><li>A technical standard </li></ul><ul><li>Product or technology driven </li></ul><ul><li>An equipment evaluation methodology such as the Common Criteria/ISO 15408 </li></ul><ul><li>- But may require utilization of a Common Criteria Equipment Assurance </li></ul><ul><li>Level (EAL) </li></ul>
  13. 17. <ul><li>ISO 27001 defines best practices for information security management. </li></ul><ul><li>A management system should balance Physical, Technical, Procedural and Personnel Security. </li></ul><ul><li>Without a formal Information Security Management System, such as a BS 7799-2 based system, there is a greater risk to your security being breached. </li></ul><ul><li>Information security is a management process, not a technological process. </li></ul>
  14. 18. <ul><li>Internal Business Drivers </li></ul><ul><li>-Corporate Governance </li></ul><ul><li>-Increased Risk Governance </li></ul><ul><li>-Competition </li></ul><ul><li>-Customer Expectation </li></ul><ul><li>- Market Expectation </li></ul><ul><li>- Market Image </li></ul><ul><li>Regulators </li></ul><ul><li>Reasons for seeking </li></ul><ul><li>Certification according to </li></ul><ul><li>BSI-DISC Survey </li></ul>
  15. 20. ISO/IEC 27001:2005 Requirements for Information Security Management Systems ISO/IEC 27002:2005 Code of Practice for Information Security Management
  16. 21. Maintain and Improve an ISMS Take corrective and preventive actions, based on the results of the management review, to achieve continual improvement of an ISMS Implement and Operate the ISMS Implement and operate the security policy , controls , processes and procedures Establish the ISMS Establish the security policy , objectives, and procedures relevant to managing risk and improving information security to deliver in accordance with an organization’s overall policies and objectives Monitor and Review the ISMS Assess and, where applicable , measure process performance against security policy, objectives and practical experience and report the results to the management for review.
  17. 22. <ul><li>Five Mandatory requirements of the standard: </li></ul><ul><li>Information Security Management System [Clause 4 of ISO/IEC 27001] </li></ul><ul><li>General requirements. [Clause 4.1 of ISO /IEC 27001] </li></ul><ul><li>Establishing and managing the ISMS (e.g. Risk Assessment) [Clause 4.2 of ISO/IEC 27001] </li></ul><ul><li>Documentation Requirements [Clause 4.3 of ISO/IEC 27001] </li></ul><ul><li>Management Responsibility [Clause 5 of ISO/IEC 27001] </li></ul><ul><li>Management Commitment [Clause 5.1 of ISO/IEC 27001] </li></ul><ul><li>Resource Management (e.g. Training, Awareness) [Clause 5.2 of ISO/IEC 27001] </li></ul><ul><li>Internal ISMS Audits [Clause 6 of ISO/IEC 27001] </li></ul><ul><li>Management Review of the ISMS [Clause 7 of ISO/IEC 27001] </li></ul><ul><li>Review Input (e.g. Audits, Measurement, Recommendations) [Clause 7.1 of ISO/IEC 27001] </li></ul><ul><li>Review Output (e.g. Update Risk Treatment Plan, New Recourses [Clause 7.2 of ISO/IEC 27001] </li></ul><ul><li>ISMS Improvement [Clause 8 of ISO/IEC 27001] </li></ul><ul><li>Continual Improvement [Clause 8.1 of ISO/IEC 27001] </li></ul><ul><li>Corrective Action [Clause 8.2 of ISO/IEC 27001] </li></ul><ul><li>Preventive Action [Clause 8.3 of ISO/IEC 27001] </li></ul>
  18. 24. ORGANIZATIONAL STRUCTURE Management Security Policy Organizational Info Sec Asset Management Access Control Compliance Human Resource Security Business Continuity Management Systems Development and Maintenance Communications and Operations Management Physical & Environ. Security Security Incident Management Operations <ul><li>Overall the Standard can be put in: </li></ul><ul><li>Domain Areas: 11 </li></ul><ul><li>Control Objectives : 39 and </li></ul><ul><li>Controls : 133 </li></ul>
  19. 25. A.5 Security Policy [A.5.1 {A.5.1.1to A.5.1.2}] Total No of Controls: 2 A.6 Organization of Information Security [A.6.1{A.6.1.1to A.6.1.8} + A.6.2{A.6.2.1to A.6.2.3}] Total No of Controls:11 A.7 Asset Management [A.7.1{A.7.1.1toA.7.1.3} + A.7.2{A.7.2.1toA.7.2.2}]- -Total No of Controls : 5 A.8 Human Resources Security [A.8.1{A.8.1.1to A.8.1.3} + A.8.2{A.8.2.1to A.8.2.3}+ A.8.3{A.8.3.1-A.8.3.3}] Total No of Controls:9 A.9 Physical and Environmental Security [A.9.1{A.9.1.1to A.9.1.6}+A.9.2{A.9.2.1to A.2.7}] Total No of Controls : 13 A.10 Communications and Operations Management [A.10.1{A.10.1.1toA.10.1.4}+A.10.2{A.10.2.1toA.10.2.3}+ A.10.3{A.10.3.1toA.10.3.2} + A.10.4{A.10.4.1to A.10.4.2} +A.10.5{A.10.5.1} + A.10.6{A.10.6.1to A.10.6.2}+A.10.7{A.10.7.1to A.10.7.4}+A.10.8{A.10.8.1to A.10.8.5}+A.10.9{A.10.9.1to A.10.9.3}+A.10.10{A.10.10.1to A.10.10.6}} Total No of Controls : 32 A.11 Access Control [A.11.1{A.11.1.1}+A.11.2{A.11.2.1toA.11.2.4}+A.11.3{A.11.3.1toA.11.3.3}+A.11.4{A.11.4.1toA.11.4.7}+A.11.5{A.11.5.1to A.11.5.6}+A.11.6{A.11.6.1to A.11.6.2}+A.11.7{A.11.7.1toA.11.7.2} Total No of Controls : 25 A.12 Information Systems Acquisition, Development, and Maintenance [A.12.1{A.12.1.1}+A.12.2{A.12.2.1to A.12.2.4}+ A.12.3{A.12.3.1to A.12.3.2}+A.12.4{A.12.4.1toA.12.4.3}+A.12.5{A.12.5.1to A.12.5.5}+A.12.6{A.12.6.1} Total No of Controls : 16 A.13 Information Security Incident Management [A.13.1{A.13.1.1}+A.13.2{A.13.2.1toA.13.2.3}] Total No of Controls :5 A.14 Business Continuity Management [A.14.1{A.14.1.1toA.14.1.5} Total No of Controls: 5 A.15 Compliance [A.15.1{A.15.1.1to A.15.1.6} + A.15.2{A.15.2.1to 15.2.2} +A.15.3{A.15.3.1 toA.15.3.2}] Total No of Controls: 10
  20. 26. <ul><li>The Introduction of ISO/IEC 27001:2005 identifies 10 controls as: </li></ul><ul><ul><li>“ a good starting point for implementing information security. They are either based on essential legislative requirements or considered to be common practice for information security.” </li></ul></ul>
  21. 27. Controls Considered Essential from a Legislative Point of View Data protection and privacy of personal information Protection of organizational records Intellectual property rights Controls Considered to be Best Practice Information security policy document Allocation of information security responsibilities Information security awareness, education, and training Correct processing in applications Technical vulnerability management Business continuity management Management of information security incidents and improvements
  22. 28. ISO/IEC 27001:2005 Clause 4.2.1 requires a risk assessment to be carried out to identify threats to assets. Guidance is now available using ISO/IEC 27005:2008
  23. 29. <ul><li>The goal of ISO/IEC 27001:2005 and ISO/IEC 27002:2005 is to: </li></ul><ul><ul><li>Safeguard the confidentiality , integrity , and availability of written, spoken, and electronic information </li></ul></ul>
  24. 30. <ul><li>Defines a process to evaluate, implement, maintain, and manage information security </li></ul><ul><li>Is based on BS 7799-1:2005 </li></ul><ul><li>Is intended for use as a reference document </li></ul><ul><li>Is based on best information security practices </li></ul><ul><li>Consists of 11 control sections, 39 control objectives, and 133 controls </li></ul><ul><li>Was developed by industry for industry </li></ul><ul><li>Is not used for assessment and registration </li></ul><ul><li>Is not a technical standard </li></ul>
  25. 31. <ul><li>Specifies requirements for establishing, implementing, and documenting Information Security Management Systems (ISMS) </li></ul><ul><li>Specifies requirements for security controls to be implemented according to the needs of individual organizations </li></ul><ul><li>Consists of 11 control sections, 39 control objectives, and 133 controls </li></ul><ul><li>Is aligned with ISO/IEC 27002:2005 </li></ul>
  26. 32. <ul><li>Harmonization with other management system standards </li></ul><ul><li>The need for continual improvement processes </li></ul><ul><li>Corporate governance </li></ul><ul><li>Information security assurance </li></ul><ul><li>Implementation of OECD principles </li></ul>
  27. 33. ISO 27799 Health Informatics - Security Management in Health using ISO 17799 ISO 19077 Software Asset Management ISO 27005 Information Security Risk Management ISO 15489 Effective Records Management ISO 21188 Public Key infrastructure for Financial Services ISO 18044 Incident Management BS 8470 Secure Disposal of confidential material BS 8549 Security Consultancy Code of Practice ISO 15288 System & Software Engineering - System lifecycle processes
  28. 34. Status 17 th January 2009 See for the registry of certificates
  29. 35. <ul><li>Provides the means for information security corporate governance </li></ul><ul><li>Improves the effectiveness of the information security environment </li></ul><ul><li>Allows for market differentiation due to a positive influence on company prestige and image, as well as a possible effect on the asset or share value of the company </li></ul><ul><li>Provides satisfaction and confidence of that customers’ information security requirements are being met </li></ul><ul><li>Allows for focused staff responsibilities </li></ul>
  30. 36. <ul><li>Ensures compliance with mandates and laws </li></ul><ul><li>Reduces liability and risk due to implemented or enforced policies and procedures, which demonstrate due diligence </li></ul><ul><li>Potentially lowers rates on insurance </li></ul><ul><li>Facilitates better awareness of security throughout the organization </li></ul><ul><li>Provides competitive advantages and reduction in costs connected with the improvement of process efficiency and the management of security costs </li></ul>
  31. 37. Presenter: Khushboo Khandelwal Business Title: Business Analyst at iViZ Techno Solutions Pvt. Ltd. Email: [email_address]