SlideShare a Scribd company logo
ISMS Audit using ISO 27001:2013
Obrina Candra
August, 2015
ISMS Audit Using
ISO 27001:2013
supported by :
Contents Outline
1. Introduction to Information Security Management Systems (and the
ISO 27000 series of standards)
2. Process-based ISMS
3. Audit : deļ¬nitions, principles and types
4. Audit process (audit plan, preparing for the on-site audit (audit stage
1), developing checklists, conducting the on-site audit (audit stage 2))
5. Audit review
6. Report and follow-up
Introduction to the ISO 27000 series of standards
what is ISO?
ISO, founded in 1947, is a worldwide federation of
national standards bodies from some 100 countries, with
one standards body representing each member country.
The American National Standards Institute (ANSI), for
example, represents the United States.
According to ISO, "ISO" is not an abbreviation. It is a
word, derived from the Greek isos, meaning "equal",
The name ISO is used around the world to denote the
organization, thus avoiding the assortment of
abbreviations that would result from the translation of
"International Organization for Standardization" into the
different national languages of members. Whatever the
country, the short form of the organization's name is
always ISO.
what is ISO?
ā€¢ International Organization for Standardization is the world's largest developer and publisher
of International Standards.
ā€¢ ISO is a network of the national standards institutes of 160 countries, one member per country (ANSI in
US, SNI in Indo), with a Central Secretariat in Geneva, Switzerland, that coordinates the system.
ā€¢ ISO is a nonā€governmental organization that forms a bridge between the public and private sectors.
ā€¢ ISO and IEC (the International Electrotechnical Commission) form the specialized system for worldwide
standardization.
ā€¢ National bodies that are members of ISO or IEC participate in the development of International
Standards through technical committees established by the respective organization to deal with
particular ļ¬elds of technical activity. ISO and IEC technical committees collaborate in ļ¬elds of mutual
interest.
ā€¢ n the ļ¬eld of information technology, ISO and IEC have established a joint technical committee, ISO/IEC
JTC 1.
ā€¢ International Standards are drafted in accordance with the rules given in the ISO/IEC Directives.
ā€¢ The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting.
Publication as an International Standard requires approval by at least 75 % of the national bodies
casting a vote.
27001
27002
27000
27004
27011
27799
Applicability
Telecommunications
Health
Financial services
Inter-sector and
Inter organizational
27003
27005
Risk Management
31000
Guide 73
27006
Certification
27007
27008
19011
Guidelines for ISMS
auditing
17021
Governance
Measurements
Code of practice
Requirements
Implementation guidance
27001+20000-1
Overview and vocabulary
Requirements for bodies
audit and certification
Guidance for auditors
on controls - TR
Guidelines for
auditing management system
Conformity assessment
- ISMS
Vocabulary
Principles and
guidelines
27016 Organizational economics
27018
Cloud Computing service
17000
Conformity Assessment ā€“
Vocabulary and general principals
31010
Risk assessment
techniques 27001
+
industry vertical
27010
27009
27013
27014
27015
Process control system - TR
27019
27017
Data protection control of
public cloud computing service
27x Extended Range
ISO/IEC 27001 family of standards last update : 10/2013
Introduction
ISMS are intended to provide organisations with
the elements of an effective information security
system in order to achieve the best practice in
information security and to maintain economic
goals.
ISO 27001, ISO 27002 are recognisable standards
against which ISMS can be audited and
certiļ¬cated
ISO 27001 (certiļ¬cation)
ā€¢ISO 27001 specifies how to establish an Information
Security Management System (ISMS).
ā€¢The adoption of an ISMS is a strategic decision.
ā€¢The design and implementation of an organizationā€™s
ISMS is influenced by its business, its security risks
and control requirements, the processes employed
and the size and structure of the organization: a
simple situation requires a simple ISMS.
ā€¢The ISMS will evolve systematically in response to
changing risks.
ā€¢Compliance with ISO27001 can be formally assessed
and certified. A certified ISMS builds confidence in
the organizationā€™s approach to information security
management among stakeholders.
Beneļ¬t of ISO 27001 Cert
ā€¢Achieve marketing
advantage
ā€¢Lower cost
ā€¢Better organization
ā€¢Comply with legal
requirements or
regulations
ISO 27002 (non-certiļ¬cation)
ā€¢ ISO 27002 is a ā€œCode of Practiceā€ recommending a
large number of information security controls.
ā€¢ the standard are generic, high-level statements of
business requirements for securing or protecting
information assets.
ā€¢ the standard are meant to be implemented in the
context of an ISMS, in order to address risks and
satisfy applicable control objectives systematically.
ā€¢ Compliance with ISO 27002 implies that the
organization has adopted a comprehensive, good
practice approach to securing information.
a brief history of the 2700x series
27001:2005 Vs 27001:2013
Context'of'the'
Organiza0on'
'
Leadership'
Planning'
Opera0on'
Improvement'
Performance'
Evalua0on'
Support'
ISO/IEC'27001:2013'
Management'
Responsibility'
'
Management'Review'
Establish'
ISMS'
Implement'
ISMS'
Improve'
ISMS'
Monitor'
ISMS'
Doc.''
Req.'
Internal''
Audit'
ISMS''
Improve'
ISO/IEC'27001:2005'
Mgmt.'
Review'
Structure'simpliļ¬ed'
27001:2005 Vs 27001:2013
ISO/IEC 27001:2005
! 132 ā€œshallā€ statements
(section 4-8)
! Annexure A
! 11 clauses
! 39 categories
! 133 controls
ISO/IEC 27001:2013
! 125 ā€œshallā€ statements
(section 4-10)
! Annexure A
! 14 clauses
! 35 categories
! 114 controls
Number'of'requirements'reduced'
Process-based ISMS
ISO 27001 Structures
ā€¢ Sections 0 to 3 are
introductory and are not
mandatory for
implementation
ā€¢ Sections 4 to 10 contains
requirements that must be
implemented in an
organization if it wants to
comply
ā€¢ Annex A contains 114
controls that must be
implemented if applicable
Section 0
Introduction
Section 1
Scope
Section 2
Normative
references
Section 3
Terms and
definitions
Section 4
Context of the
organization
Section 5
Leadership
Section 6
Planning
Section 7
Support
Section 8
Operation
Section 9
Performance
evaluation
Section 10
Improvement
Annex A
PDCA Model applied to ISMS Processes
Interested
Parties
Interested
Parties
Information
Security
Requirements
& Expectations
Managed
Information
Security
Establish
ISMS
Implement &
Operate ISMS
Maintain &
Improve ISMS
Monitor &
Review ISMS
Plan
Do
Check
Act
Development,
Maintenance and
Improvement Cycle
Mandatory controls
ā€¢ The importance of mandatory
clauses is punctuated by the fact
that during ISMS audits if the
auditor discovers that any single
one of the mandatory clauses are
not supported by evidence, missing
or is deemed ineffective it is
considered a major non-
conformity. This mean it is reason
enough for the auditor not to
recommended the organization for
certification.
ā€¢ In the event that the audit is part of
the ongoing continuous assessment
review the organization could be
decertified. Its that important!
ā€¢ Clauses 4 ā€“ 10 require a gap
assessment initially to identify the
missing mandatory controls. Zero
exclusions are permitted and
thatā€™s why a Gap Assessment is the
best approach.
Mandatory controls (sample)
the organization must deļ¬ne the scope of the ISMS (clause 4.3)
top mgmt and managers must show leadership to the ISMS (clause 5.1)
the ISMS policy should be appropriate to the purpose of the organization (clause 5.2) -must be
documented and communicated
the mgmt must ensure the responsibilities and authorities for security roles must be assigned &
communicated (clause 5.3)
there must be risk assessment and risk treatment plan established (clause 6.1, 6.1.3)
there must be an information security objectives that meets the organizationā€™s business goals and
risk management process (clause 6.2)
competency needs must be identiļ¬ed, reviewed and managed so that personnel can perform their
roles effectively (clause 7.2)
etcā€¦
Discretionary controls
ā€¢ Within Annex A a series of control
objectives have been listed. These control
objectives have been designed to address
known risks.
ā€¢ These controls are initially risk assessed
during implementation /adoption for fit
within each individual organization.
ā€¢ The risk assessment provides evidence for
applicability and /or justification for
exclusion. The results are listed within the
Statement of Applicability (SoA).
ā€¢ The SoA is a controlled document that gets
included with the Registration Auditors
recommendations which the auditor submits
to ISO for final gating and approval.
ā€¢ During the ISMS internal and external
audits if a weaknesses is discovered within
the controls it will require a corrective
action plan and /or preventive action
(CAPA) plan. The CAPA is listed within the
Risk Treatment Plan and monitored until
completed and then validated before its
formally closed.
ā€¢ Please note that while a single weakness
may be tolerated a cluster of failed
controls within the same domain will
result in a major nonconformity and
potential decertification.
Discretionary controls (sample)
labelling of information (A8.2.2)
handling of assets (A8.2.3)
management of removable media (A8.3.1)
disposal of media (A8.3.2)
secure log-on (A9.2.3)
working in secure areas (A11.1.5)
installation of software on operational system (A12.5.1)
information transfer (A13.2.1)
system change control (A14.2.2)
response to information security incidents (A16)
information security continuity (A17.1.2)
intellectual property rights (A18.1.2)
etcā€¦
Audit : deļ¬nitions, principles and types
My#Life#as#an#Information#Security#Consultant#
Deļ¬nition
ISO 19011 define audit as a :
ā€œSystematic process, independent and documented for
obtaining audit evidence and evaluate objectively, in order
to establish to what extent are audit criteria metā€.
Principles
ethical conduct
professional, fair (unbiased), responsible
fair presentation
presents appropriately (words, gesture, etc), truthful and accurate in findings
due professional care
competence in the field of the audit
independence
free from conflict of interest
evidenceā€“based approach
do not make assumptions, stick to the audit evidence
confidentiality
careful and discreet towards the informations provided by the audit
Types of audit
ā€¢ Internal audits (1st party) sponsored by by the organization with the
aim of improvement of the ISMS.
ā€¢ External audit (2nd party) audits carried out by an organisation on its
supplier (partners, vendors) using, either internal personnel, or external
entity entrusted with doing it.
ā€¢ Certification audit (third party) independent from the
organizationwith the aim to release the certificate of conformity with the
requirements taken as a audit criteria (ISO 27001).
Audit Process
the big picture
What is
happening
What
changes
are needed
What
should be
happening
the medium picture
the process
1. Audit planning
2. Stage 1 audit
3. Stage 2 audit
audit planning
1. define audit objectives
2. define audit scope
3. select audit criteria
4. select sampling method
5. select audit team
6. define observers and guides (if necessary)
7. define resources needed
stage 1 audit
1. Initiation of audit
2. Auditeeā€™s application (self-assessment document)
3. Document review
4. Planning work documents (forms, procedures, etc)
5. Organisationā€™s unit and processes to be audited
6. Estimation of time
7. Work schedule
developing a checklist
1. Appropriately phrased questions
2. Use open questions (avoid yes/no answers)
3. Dig deep
developing a checklist
developing a checklist
stage 2 audit (on-site audit)
1. Opening meeting
2. Collecting information by appropriate sampling
3. Questioning techniques (calm, polite, reassuring)
4. Stick to the plan (time, resource)
5. Documentation (collect evidence, take notes)
6. Control the audit (avoid confrontation and intimidation)
Sampling technique
Random Sample = each record in the population has an equal chance of being
selected for inclusion in the sample
e.g. Population = 200 hip replacements
10% random sample= any 20 cases in the population
Stratified Random Sample = Identifying a subset of the population and randomly
sampling that subset.
e.g. Patients aged over 65 with a hip replacement
Population = 200 hip replacements
10% random stratified sample= any 20 cases in the population where the patient is
aged over 65 years
Targeted Sample = Sample includes only a particular section of the population e.g.
Patients aged over 65 with a hip replacement
Population = 200 hip replacements
Targeted sample= All cases in the population where the patient is aged over 65
years
stage 2 audit (on-site audit)
techniques :
1. Questioning - people
2. Observing - process, equipment
3. Documenting - audit finding, evidence
4. Checking - assets
Audit Review
audit review
1. Audit team review meeting
2. Listing of audit findings (with evidence, if any)
3. Finding statement
4. Corrective Action Request (CAR) form
5. Classification of CARs (major - minor)
6. Opportunity of improvement
7. Audit conclusion
audit ļ¬ndings
1. Non-Conformity (NC) -> non-fulfillment of requirement
(mandatory req = major NC; discretionary req = minor NC)
2. Opportunity of Improvement (OFI) -> non-fulfillment of
controls
3. Observation -> negligence, e.g. one-day of log is missing
ļ¬nding statement
1. clear statement of the finding (NC/OFI)
2. the evidence which the finding is based
3. summary of the requirement (clause/annex)
ļ¬nding statement
CARs example
Major CARs
1. Major CARs must be corrected before certification of ISO 27001
can be recommended
2. Minor CARs allows certification to proceed
3. Corrective actions described in CARs usually verified at the
following surveillance visit
4. If not closed, a Minor CARs will be re-classified as Major
5. Audit should be positive and constructive, therefore, effective
corrective action is more important.
Report and follow-up
Reporting & follow-up
1. Conducting a closing meeting (presenting the finding)
2. Reporting on the audit (approval, distribution, retention)
3. Audit follow-up (surveillance visits, revised CARs) will be initiated
by the audit
4. Audit close-out (signing-off all forms)
thatā€™s all folks..
Workshops
A. Audit evidence/audit trails
B. Continual improvement
C. Risk assessment
D. ISMS audit questionnaire
E. Document review
F. Planning the audit
G. Interpretation of the standard
H. Case study

More Related Content

Similar to Auditing Information Security Management System Using ISO 27001 2013

ISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptxISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptx
Napoleon NV
Ā 
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
Lars Neupart
Ā 
Neupart Bright Talk - How Does the New ISO 27001 Impact Your IT Risk Manageme...
Neupart Bright Talk - How Does the New ISO 27001 Impact Your IT Risk Manageme...Neupart Bright Talk - How Does the New ISO 27001 Impact Your IT Risk Manageme...
Neupart Bright Talk - How Does the New ISO 27001 Impact Your IT Risk Manageme...
KMD
Ā 
ISO 9000 & ISO 14000: pptx..............
ISO 9000 & ISO 14000: pptx..............ISO 9000 & ISO 14000: pptx..............
ISO 9000 & ISO 14000: pptx..............
GayatriBahatkar1
Ā 
Auditing Standard and Practice
Auditing Standard and Practice Auditing Standard and Practice
Auditing Standard and Practice
Bikash Kumar
Ā 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx
Suman Garai
Ā 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
newbie2019
Ā 
ISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptxISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptx
jojo82637
Ā 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business ValueHyTrust
Ā 
NQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap Guide
NQA
Ā 
Upload iso 9001 2015 presentation
Upload iso 9001 2015 presentationUpload iso 9001 2015 presentation
Upload iso 9001 2015 presentation
Rajeesh Thumpayil
Ā 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
Dipin Sharma
Ā 
Maximize Data Security with ISO 27001 Certification in Saudi Arabia.pdf
Maximize Data Security with ISO 27001 Certification in Saudi Arabia.pdfMaximize Data Security with ISO 27001 Certification in Saudi Arabia.pdf
Maximize Data Security with ISO 27001 Certification in Saudi Arabia.pdf
Maxicert Mohan
Ā 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001
Chandan Singh Ghodela
Ā 
ISO 27001-Manage IT Risks and Build Customer Confidence
ISO 27001-Manage IT Risks and Build Customer ConfidenceISO 27001-Manage IT Risks and Build Customer Confidence
ISO 27001-Manage IT Risks and Build Customer ConfidenceAl Abbas, PMP, CISSP, MBA, MSc
Ā 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
Dipin Sharma
Ā 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
Dipin Sharma
Ā 
How to get iso 27001 certification in uganda
How to get iso 27001 certification in ugandaHow to get iso 27001 certification in uganda
How to get iso 27001 certification in uganda
Anoosha Factocert
Ā 
Iso27001 Audit Services
Iso27001 Audit ServicesIso27001 Audit Services
Iso27001 Audit Services
mcloete
Ā 
ISO 37301 Compliance Management Systems
ISO 37301 Compliance Management SystemsISO 37301 Compliance Management Systems
ISO 37301 Compliance Management Systems
Nimonik
Ā 

Similar to Auditing Information Security Management System Using ISO 27001 2013 (20)

ISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptxISO27k ISMS implementation and certification process overview v2.pptx
ISO27k ISMS implementation and certification process overview v2.pptx
Ā 
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
Ā 
Neupart Bright Talk - How Does the New ISO 27001 Impact Your IT Risk Manageme...
Neupart Bright Talk - How Does the New ISO 27001 Impact Your IT Risk Manageme...Neupart Bright Talk - How Does the New ISO 27001 Impact Your IT Risk Manageme...
Neupart Bright Talk - How Does the New ISO 27001 Impact Your IT Risk Manageme...
Ā 
ISO 9000 & ISO 14000: pptx..............
ISO 9000 & ISO 14000: pptx..............ISO 9000 & ISO 14000: pptx..............
ISO 9000 & ISO 14000: pptx..............
Ā 
Auditing Standard and Practice
Auditing Standard and Practice Auditing Standard and Practice
Auditing Standard and Practice
Ā 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx
Ā 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
Ā 
ISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptxISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptx
Ā 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business Value
Ā 
NQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap Guide
Ā 
Upload iso 9001 2015 presentation
Upload iso 9001 2015 presentationUpload iso 9001 2015 presentation
Upload iso 9001 2015 presentation
Ā 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
Ā 
Maximize Data Security with ISO 27001 Certification in Saudi Arabia.pdf
Maximize Data Security with ISO 27001 Certification in Saudi Arabia.pdfMaximize Data Security with ISO 27001 Certification in Saudi Arabia.pdf
Maximize Data Security with ISO 27001 Certification in Saudi Arabia.pdf
Ā 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001
Ā 
ISO 27001-Manage IT Risks and Build Customer Confidence
ISO 27001-Manage IT Risks and Build Customer ConfidenceISO 27001-Manage IT Risks and Build Customer Confidence
ISO 27001-Manage IT Risks and Build Customer Confidence
Ā 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
Ā 
Damco iso 27001
Damco iso   27001Damco iso   27001
Damco iso 27001
Ā 
How to get iso 27001 certification in uganda
How to get iso 27001 certification in ugandaHow to get iso 27001 certification in uganda
How to get iso 27001 certification in uganda
Ā 
Iso27001 Audit Services
Iso27001 Audit ServicesIso27001 Audit Services
Iso27001 Audit Services
Ā 
ISO 37301 Compliance Management Systems
ISO 37301 Compliance Management SystemsISO 37301 Compliance Management Systems
ISO 37301 Compliance Management Systems
Ā 

More from Andrea Porter

Taking Notes With Note Cards
Taking Notes With Note CardsTaking Notes With Note Cards
Taking Notes With Note Cards
Andrea Porter
Ā 
How To Write A TOK Essay 15 Steps (With Pictures) - WikiHow
How To Write A TOK Essay 15 Steps (With Pictures) - WikiHowHow To Write A TOK Essay 15 Steps (With Pictures) - WikiHow
How To Write A TOK Essay 15 Steps (With Pictures) - WikiHow
Andrea Porter
Ā 
How To Write A Good Topic Sentence In Academic Writing
How To Write A Good Topic Sentence In Academic WritingHow To Write A Good Topic Sentence In Academic Writing
How To Write A Good Topic Sentence In Academic Writing
Andrea Porter
Ā 
Narrative Essay Argumentative Essay Thesis
Narrative Essay Argumentative Essay ThesisNarrative Essay Argumentative Essay Thesis
Narrative Essay Argumentative Essay Thesis
Andrea Porter
Ā 
A Good Introduction For A Research Paper. Writing A G
A Good Introduction For A Research Paper. Writing A GA Good Introduction For A Research Paper. Writing A G
A Good Introduction For A Research Paper. Writing A G
Andrea Porter
Ā 
How To Find The Best Paper Writing Company
How To Find The Best Paper Writing CompanyHow To Find The Best Paper Writing Company
How To Find The Best Paper Writing Company
Andrea Porter
Ā 
Primary Handwriting Paper - Paging Supermom - Free Printable Writing
Primary Handwriting Paper - Paging Supermom - Free Printable WritingPrimary Handwriting Paper - Paging Supermom - Free Printable Writing
Primary Handwriting Paper - Paging Supermom - Free Printable Writing
Andrea Porter
Ā 
Write An Essay On College Experience In EnglishDesc
Write An Essay On College Experience In EnglishDescWrite An Essay On College Experience In EnglishDesc
Write An Essay On College Experience In EnglishDesc
Andrea Porter
Ā 
Ghost Writing KennyLeeHolmes.Com
Ghost Writing KennyLeeHolmes.ComGhost Writing KennyLeeHolmes.Com
Ghost Writing KennyLeeHolmes.Com
Andrea Porter
Ā 
How To Write A Good Concluding Observation Bo
How To Write A Good Concluding Observation BoHow To Write A Good Concluding Observation Bo
How To Write A Good Concluding Observation Bo
Andrea Porter
Ā 
How To Write An Argumentative Essay
How To Write An Argumentative EssayHow To Write An Argumentative Essay
How To Write An Argumentative Essay
Andrea Porter
Ā 
7 Introduction Essay About Yourself - Introduction Letter
7 Introduction Essay About Yourself - Introduction Letter7 Introduction Essay About Yourself - Introduction Letter
7 Introduction Essay About Yourself - Introduction Letter
Andrea Porter
Ā 
Persuasive Essay Essaypro Writers
Persuasive Essay Essaypro WritersPersuasive Essay Essaypro Writers
Persuasive Essay Essaypro Writers
Andrea Porter
Ā 
Scholarship Personal Essays Templates At Allbusinesst
Scholarship Personal Essays Templates At AllbusinesstScholarship Personal Essays Templates At Allbusinesst
Scholarship Personal Essays Templates At Allbusinesst
Andrea Porter
Ā 
How To Create An Outline For An Essay
How To Create An Outline For An EssayHow To Create An Outline For An Essay
How To Create An Outline For An Essay
Andrea Porter
Ā 
ESSAY - Qualities Of A Good Teach
ESSAY - Qualities Of A Good TeachESSAY - Qualities Of A Good Teach
ESSAY - Qualities Of A Good Teach
Andrea Porter
Ā 
Fountain Pen Writing On Paper - Castle Rock Financial Planning
Fountain Pen Writing On Paper - Castle Rock Financial PlanningFountain Pen Writing On Paper - Castle Rock Financial Planning
Fountain Pen Writing On Paper - Castle Rock Financial Planning
Andrea Porter
Ā 
Formatting A Research Paper E
Formatting A Research Paper EFormatting A Research Paper E
Formatting A Research Paper E
Andrea Porter
Ā 
Business Paper Examples Of Graduate School Admissio
Business Paper Examples Of Graduate School AdmissioBusiness Paper Examples Of Graduate School Admissio
Business Paper Examples Of Graduate School Admissio
Andrea Porter
Ā 
Impact Of Poverty On The Society - Free Essay E
Impact Of Poverty On The Society - Free Essay EImpact Of Poverty On The Society - Free Essay E
Impact Of Poverty On The Society - Free Essay E
Andrea Porter
Ā 

More from Andrea Porter (20)

Taking Notes With Note Cards
Taking Notes With Note CardsTaking Notes With Note Cards
Taking Notes With Note Cards
Ā 
How To Write A TOK Essay 15 Steps (With Pictures) - WikiHow
How To Write A TOK Essay 15 Steps (With Pictures) - WikiHowHow To Write A TOK Essay 15 Steps (With Pictures) - WikiHow
How To Write A TOK Essay 15 Steps (With Pictures) - WikiHow
Ā 
How To Write A Good Topic Sentence In Academic Writing
How To Write A Good Topic Sentence In Academic WritingHow To Write A Good Topic Sentence In Academic Writing
How To Write A Good Topic Sentence In Academic Writing
Ā 
Narrative Essay Argumentative Essay Thesis
Narrative Essay Argumentative Essay ThesisNarrative Essay Argumentative Essay Thesis
Narrative Essay Argumentative Essay Thesis
Ā 
A Good Introduction For A Research Paper. Writing A G
A Good Introduction For A Research Paper. Writing A GA Good Introduction For A Research Paper. Writing A G
A Good Introduction For A Research Paper. Writing A G
Ā 
How To Find The Best Paper Writing Company
How To Find The Best Paper Writing CompanyHow To Find The Best Paper Writing Company
How To Find The Best Paper Writing Company
Ā 
Primary Handwriting Paper - Paging Supermom - Free Printable Writing
Primary Handwriting Paper - Paging Supermom - Free Printable WritingPrimary Handwriting Paper - Paging Supermom - Free Printable Writing
Primary Handwriting Paper - Paging Supermom - Free Printable Writing
Ā 
Write An Essay On College Experience In EnglishDesc
Write An Essay On College Experience In EnglishDescWrite An Essay On College Experience In EnglishDesc
Write An Essay On College Experience In EnglishDesc
Ā 
Ghost Writing KennyLeeHolmes.Com
Ghost Writing KennyLeeHolmes.ComGhost Writing KennyLeeHolmes.Com
Ghost Writing KennyLeeHolmes.Com
Ā 
How To Write A Good Concluding Observation Bo
How To Write A Good Concluding Observation BoHow To Write A Good Concluding Observation Bo
How To Write A Good Concluding Observation Bo
Ā 
How To Write An Argumentative Essay
How To Write An Argumentative EssayHow To Write An Argumentative Essay
How To Write An Argumentative Essay
Ā 
7 Introduction Essay About Yourself - Introduction Letter
7 Introduction Essay About Yourself - Introduction Letter7 Introduction Essay About Yourself - Introduction Letter
7 Introduction Essay About Yourself - Introduction Letter
Ā 
Persuasive Essay Essaypro Writers
Persuasive Essay Essaypro WritersPersuasive Essay Essaypro Writers
Persuasive Essay Essaypro Writers
Ā 
Scholarship Personal Essays Templates At Allbusinesst
Scholarship Personal Essays Templates At AllbusinesstScholarship Personal Essays Templates At Allbusinesst
Scholarship Personal Essays Templates At Allbusinesst
Ā 
How To Create An Outline For An Essay
How To Create An Outline For An EssayHow To Create An Outline For An Essay
How To Create An Outline For An Essay
Ā 
ESSAY - Qualities Of A Good Teach
ESSAY - Qualities Of A Good TeachESSAY - Qualities Of A Good Teach
ESSAY - Qualities Of A Good Teach
Ā 
Fountain Pen Writing On Paper - Castle Rock Financial Planning
Fountain Pen Writing On Paper - Castle Rock Financial PlanningFountain Pen Writing On Paper - Castle Rock Financial Planning
Fountain Pen Writing On Paper - Castle Rock Financial Planning
Ā 
Formatting A Research Paper E
Formatting A Research Paper EFormatting A Research Paper E
Formatting A Research Paper E
Ā 
Business Paper Examples Of Graduate School Admissio
Business Paper Examples Of Graduate School AdmissioBusiness Paper Examples Of Graduate School Admissio
Business Paper Examples Of Graduate School Admissio
Ā 
Impact Of Poverty On The Society - Free Essay E
Impact Of Poverty On The Society - Free Essay EImpact Of Poverty On The Society - Free Essay E
Impact Of Poverty On The Society - Free Essay E
Ā 

Recently uploaded

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
Ā 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
Ā 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
Ā 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
Ā 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
Ā 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
Ā 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
Ā 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
Ā 
The Accursed House by Ɖmile Gaboriau.pptx
The Accursed House by Ɖmile Gaboriau.pptxThe Accursed House by Ɖmile Gaboriau.pptx
The Accursed House by Ɖmile Gaboriau.pptx
DhatriParmar
Ā 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
Ā 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
Ā 
BƀI Tįŗ¬P Bį»” TRį»¢ TIįŗ¾NG ANH GLOBAL SUCCESS Lį»šP 3 - Cįŗ¢ NĂM (CƓ FILE NGHE Vƀ ĐƁP Ɓ...
BƀI Tįŗ¬P Bį»” TRį»¢ TIįŗ¾NG ANH GLOBAL SUCCESS Lį»šP 3 - Cįŗ¢ NĂM (CƓ FILE NGHE Vƀ ĐƁP Ɓ...BƀI Tįŗ¬P Bį»” TRį»¢ TIįŗ¾NG ANH GLOBAL SUCCESS Lį»šP 3 - Cįŗ¢ NĂM (CƓ FILE NGHE Vƀ ĐƁP Ɓ...
BƀI Tįŗ¬P Bį»” TRį»¢ TIįŗ¾NG ANH GLOBAL SUCCESS Lį»šP 3 - Cįŗ¢ NĂM (CƓ FILE NGHE Vƀ ĐƁP Ɓ...
Nguyen Thanh Tu Collection
Ā 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
Ā 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
Ā 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
Ā 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
Ā 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
Ā 
Lapbook sobre os Regimes TotalitƔrios.pdf
Lapbook sobre os Regimes TotalitƔrios.pdfLapbook sobre os Regimes TotalitƔrios.pdf
Lapbook sobre os Regimes TotalitƔrios.pdf
Jean Carlos Nunes PaixĆ£o
Ā 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
Ā 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
Ā 

Recently uploaded (20)

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Ā 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Ā 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Ā 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Ā 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Ā 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
Ā 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Ā 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
Ā 
The Accursed House by Ɖmile Gaboriau.pptx
The Accursed House by Ɖmile Gaboriau.pptxThe Accursed House by Ɖmile Gaboriau.pptx
The Accursed House by Ɖmile Gaboriau.pptx
Ā 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Ā 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Ā 
BƀI Tįŗ¬P Bį»” TRį»¢ TIįŗ¾NG ANH GLOBAL SUCCESS Lį»šP 3 - Cįŗ¢ NĂM (CƓ FILE NGHE Vƀ ĐƁP Ɓ...
BƀI Tįŗ¬P Bį»” TRį»¢ TIįŗ¾NG ANH GLOBAL SUCCESS Lį»šP 3 - Cįŗ¢ NĂM (CƓ FILE NGHE Vƀ ĐƁP Ɓ...BƀI Tįŗ¬P Bį»” TRį»¢ TIįŗ¾NG ANH GLOBAL SUCCESS Lį»šP 3 - Cįŗ¢ NĂM (CƓ FILE NGHE Vƀ ĐƁP Ɓ...
BƀI Tįŗ¬P Bį»” TRį»¢ TIįŗ¾NG ANH GLOBAL SUCCESS Lį»šP 3 - Cįŗ¢ NĂM (CƓ FILE NGHE Vƀ ĐƁP Ɓ...
Ā 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Ā 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Ā 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
Ā 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
Ā 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
Ā 
Lapbook sobre os Regimes TotalitƔrios.pdf
Lapbook sobre os Regimes TotalitƔrios.pdfLapbook sobre os Regimes TotalitƔrios.pdf
Lapbook sobre os Regimes TotalitƔrios.pdf
Ā 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
Ā 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Ā 

Auditing Information Security Management System Using ISO 27001 2013

  • 1. ISMS Audit using ISO 27001:2013 Obrina Candra August, 2015
  • 2. ISMS Audit Using ISO 27001:2013 supported by :
  • 3. Contents Outline 1. Introduction to Information Security Management Systems (and the ISO 27000 series of standards) 2. Process-based ISMS 3. Audit : deļ¬nitions, principles and types 4. Audit process (audit plan, preparing for the on-site audit (audit stage 1), developing checklists, conducting the on-site audit (audit stage 2)) 5. Audit review 6. Report and follow-up
  • 4. Introduction to the ISO 27000 series of standards
  • 5. what is ISO? ISO, founded in 1947, is a worldwide federation of national standards bodies from some 100 countries, with one standards body representing each member country. The American National Standards Institute (ANSI), for example, represents the United States. According to ISO, "ISO" is not an abbreviation. It is a word, derived from the Greek isos, meaning "equal", The name ISO is used around the world to denote the organization, thus avoiding the assortment of abbreviations that would result from the translation of "International Organization for Standardization" into the different national languages of members. Whatever the country, the short form of the organization's name is always ISO.
  • 6. what is ISO? ā€¢ International Organization for Standardization is the world's largest developer and publisher of International Standards. ā€¢ ISO is a network of the national standards institutes of 160 countries, one member per country (ANSI in US, SNI in Indo), with a Central Secretariat in Geneva, Switzerland, that coordinates the system. ā€¢ ISO is a nonā€governmental organization that forms a bridge between the public and private sectors. ā€¢ ISO and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. ā€¢ National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular ļ¬elds of technical activity. ISO and IEC technical committees collaborate in ļ¬elds of mutual interest. ā€¢ n the ļ¬eld of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. ā€¢ International Standards are drafted in accordance with the rules given in the ISO/IEC Directives. ā€¢ The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote.
  • 7. 27001 27002 27000 27004 27011 27799 Applicability Telecommunications Health Financial services Inter-sector and Inter organizational 27003 27005 Risk Management 31000 Guide 73 27006 Certification 27007 27008 19011 Guidelines for ISMS auditing 17021 Governance Measurements Code of practice Requirements Implementation guidance 27001+20000-1 Overview and vocabulary Requirements for bodies audit and certification Guidance for auditors on controls - TR Guidelines for auditing management system Conformity assessment - ISMS Vocabulary Principles and guidelines 27016 Organizational economics 27018 Cloud Computing service 17000 Conformity Assessment ā€“ Vocabulary and general principals 31010 Risk assessment techniques 27001 + industry vertical 27010 27009 27013 27014 27015 Process control system - TR 27019 27017 Data protection control of public cloud computing service 27x Extended Range ISO/IEC 27001 family of standards last update : 10/2013
  • 8. Introduction ISMS are intended to provide organisations with the elements of an effective information security system in order to achieve the best practice in information security and to maintain economic goals. ISO 27001, ISO 27002 are recognisable standards against which ISMS can be audited and certiļ¬cated
  • 9. ISO 27001 (certiļ¬cation) ā€¢ISO 27001 specifies how to establish an Information Security Management System (ISMS). ā€¢The adoption of an ISMS is a strategic decision. ā€¢The design and implementation of an organizationā€™s ISMS is influenced by its business, its security risks and control requirements, the processes employed and the size and structure of the organization: a simple situation requires a simple ISMS. ā€¢The ISMS will evolve systematically in response to changing risks. ā€¢Compliance with ISO27001 can be formally assessed and certified. A certified ISMS builds confidence in the organizationā€™s approach to information security management among stakeholders.
  • 10. Beneļ¬t of ISO 27001 Cert ā€¢Achieve marketing advantage ā€¢Lower cost ā€¢Better organization ā€¢Comply with legal requirements or regulations
  • 11. ISO 27002 (non-certiļ¬cation) ā€¢ ISO 27002 is a ā€œCode of Practiceā€ recommending a large number of information security controls. ā€¢ the standard are generic, high-level statements of business requirements for securing or protecting information assets. ā€¢ the standard are meant to be implemented in the context of an ISMS, in order to address risks and satisfy applicable control objectives systematically. ā€¢ Compliance with ISO 27002 implies that the organization has adopted a comprehensive, good practice approach to securing information.
  • 12. a brief history of the 2700x series
  • 14. 27001:2005 Vs 27001:2013 ISO/IEC 27001:2005 ! 132 ā€œshallā€ statements (section 4-8) ! Annexure A ! 11 clauses ! 39 categories ! 133 controls ISO/IEC 27001:2013 ! 125 ā€œshallā€ statements (section 4-10) ! Annexure A ! 14 clauses ! 35 categories ! 114 controls Number'of'requirements'reduced'
  • 16. ISO 27001 Structures ā€¢ Sections 0 to 3 are introductory and are not mandatory for implementation ā€¢ Sections 4 to 10 contains requirements that must be implemented in an organization if it wants to comply ā€¢ Annex A contains 114 controls that must be implemented if applicable Section 0 Introduction Section 1 Scope Section 2 Normative references Section 3 Terms and definitions Section 4 Context of the organization Section 5 Leadership Section 6 Planning Section 7 Support Section 8 Operation Section 9 Performance evaluation Section 10 Improvement Annex A
  • 17. PDCA Model applied to ISMS Processes Interested Parties Interested Parties Information Security Requirements & Expectations Managed Information Security Establish ISMS Implement & Operate ISMS Maintain & Improve ISMS Monitor & Review ISMS Plan Do Check Act Development, Maintenance and Improvement Cycle
  • 18.
  • 19. Mandatory controls ā€¢ The importance of mandatory clauses is punctuated by the fact that during ISMS audits if the auditor discovers that any single one of the mandatory clauses are not supported by evidence, missing or is deemed ineffective it is considered a major non- conformity. This mean it is reason enough for the auditor not to recommended the organization for certification. ā€¢ In the event that the audit is part of the ongoing continuous assessment review the organization could be decertified. Its that important! ā€¢ Clauses 4 ā€“ 10 require a gap assessment initially to identify the missing mandatory controls. Zero exclusions are permitted and thatā€™s why a Gap Assessment is the best approach.
  • 20. Mandatory controls (sample) the organization must deļ¬ne the scope of the ISMS (clause 4.3) top mgmt and managers must show leadership to the ISMS (clause 5.1) the ISMS policy should be appropriate to the purpose of the organization (clause 5.2) -must be documented and communicated the mgmt must ensure the responsibilities and authorities for security roles must be assigned & communicated (clause 5.3) there must be risk assessment and risk treatment plan established (clause 6.1, 6.1.3) there must be an information security objectives that meets the organizationā€™s business goals and risk management process (clause 6.2) competency needs must be identiļ¬ed, reviewed and managed so that personnel can perform their roles effectively (clause 7.2) etcā€¦
  • 21. Discretionary controls ā€¢ Within Annex A a series of control objectives have been listed. These control objectives have been designed to address known risks. ā€¢ These controls are initially risk assessed during implementation /adoption for fit within each individual organization. ā€¢ The risk assessment provides evidence for applicability and /or justification for exclusion. The results are listed within the Statement of Applicability (SoA). ā€¢ The SoA is a controlled document that gets included with the Registration Auditors recommendations which the auditor submits to ISO for final gating and approval. ā€¢ During the ISMS internal and external audits if a weaknesses is discovered within the controls it will require a corrective action plan and /or preventive action (CAPA) plan. The CAPA is listed within the Risk Treatment Plan and monitored until completed and then validated before its formally closed. ā€¢ Please note that while a single weakness may be tolerated a cluster of failed controls within the same domain will result in a major nonconformity and potential decertification.
  • 22. Discretionary controls (sample) labelling of information (A8.2.2) handling of assets (A8.2.3) management of removable media (A8.3.1) disposal of media (A8.3.2) secure log-on (A9.2.3) working in secure areas (A11.1.5) installation of software on operational system (A12.5.1) information transfer (A13.2.1) system change control (A14.2.2) response to information security incidents (A16) information security continuity (A17.1.2) intellectual property rights (A18.1.2) etcā€¦
  • 23. Audit : deļ¬nitions, principles and types
  • 25. Deļ¬nition ISO 19011 define audit as a : ā€œSystematic process, independent and documented for obtaining audit evidence and evaluate objectively, in order to establish to what extent are audit criteria metā€.
  • 26. Principles ethical conduct professional, fair (unbiased), responsible fair presentation presents appropriately (words, gesture, etc), truthful and accurate in findings due professional care competence in the field of the audit independence free from conflict of interest evidenceā€“based approach do not make assumptions, stick to the audit evidence confidentiality careful and discreet towards the informations provided by the audit
  • 27. Types of audit ā€¢ Internal audits (1st party) sponsored by by the organization with the aim of improvement of the ISMS. ā€¢ External audit (2nd party) audits carried out by an organisation on its supplier (partners, vendors) using, either internal personnel, or external entity entrusted with doing it. ā€¢ Certification audit (third party) independent from the organizationwith the aim to release the certificate of conformity with the requirements taken as a audit criteria (ISO 27001).
  • 29. the big picture What is happening What changes are needed What should be happening
  • 31. the process 1. Audit planning 2. Stage 1 audit 3. Stage 2 audit
  • 32. audit planning 1. define audit objectives 2. define audit scope 3. select audit criteria 4. select sampling method 5. select audit team 6. define observers and guides (if necessary) 7. define resources needed
  • 33. stage 1 audit 1. Initiation of audit 2. Auditeeā€™s application (self-assessment document) 3. Document review 4. Planning work documents (forms, procedures, etc) 5. Organisationā€™s unit and processes to be audited 6. Estimation of time 7. Work schedule
  • 34. developing a checklist 1. Appropriately phrased questions 2. Use open questions (avoid yes/no answers) 3. Dig deep
  • 37. stage 2 audit (on-site audit) 1. Opening meeting 2. Collecting information by appropriate sampling 3. Questioning techniques (calm, polite, reassuring) 4. Stick to the plan (time, resource) 5. Documentation (collect evidence, take notes) 6. Control the audit (avoid confrontation and intimidation)
  • 38. Sampling technique Random Sample = each record in the population has an equal chance of being selected for inclusion in the sample e.g. Population = 200 hip replacements 10% random sample= any 20 cases in the population Stratified Random Sample = Identifying a subset of the population and randomly sampling that subset. e.g. Patients aged over 65 with a hip replacement Population = 200 hip replacements 10% random stratified sample= any 20 cases in the population where the patient is aged over 65 years Targeted Sample = Sample includes only a particular section of the population e.g. Patients aged over 65 with a hip replacement Population = 200 hip replacements Targeted sample= All cases in the population where the patient is aged over 65 years
  • 39. stage 2 audit (on-site audit) techniques : 1. Questioning - people 2. Observing - process, equipment 3. Documenting - audit finding, evidence 4. Checking - assets
  • 41. audit review 1. Audit team review meeting 2. Listing of audit findings (with evidence, if any) 3. Finding statement 4. Corrective Action Request (CAR) form 5. Classification of CARs (major - minor) 6. Opportunity of improvement 7. Audit conclusion
  • 42. audit ļ¬ndings 1. Non-Conformity (NC) -> non-fulfillment of requirement (mandatory req = major NC; discretionary req = minor NC) 2. Opportunity of Improvement (OFI) -> non-fulfillment of controls 3. Observation -> negligence, e.g. one-day of log is missing
  • 43. ļ¬nding statement 1. clear statement of the finding (NC/OFI) 2. the evidence which the finding is based 3. summary of the requirement (clause/annex)
  • 46. Major CARs 1. Major CARs must be corrected before certification of ISO 27001 can be recommended 2. Minor CARs allows certification to proceed 3. Corrective actions described in CARs usually verified at the following surveillance visit 4. If not closed, a Minor CARs will be re-classified as Major 5. Audit should be positive and constructive, therefore, effective corrective action is more important.
  • 48. Reporting & follow-up 1. Conducting a closing meeting (presenting the finding) 2. Reporting on the audit (approval, distribution, retention) 3. Audit follow-up (surveillance visits, revised CARs) will be initiated by the audit 4. Audit close-out (signing-off all forms)
  • 50. Workshops A. Audit evidence/audit trails B. Continual improvement C. Risk assessment D. ISMS audit questionnaire E. Document review F. Planning the audit G. Interpretation of the standard H. Case study