SlideShare a Scribd company logo
1 of 12
iFour ConsultancyAnnexure A Control: 12 – Operations Security
A 12.4 Logging and Monitoring
 Objective: To record events and secure evidence.
 Security event logging and monitoring is examining electronic audit logs for indications that
 Unauthorized security-related activities have been attempted or performed on a system or application
that
 Processes
 Transmits
 Stores
confidential information.
 Event logging and monitoring assists organizations to determine what has been recorded on their
systems for follow-up investigation and if necessary remediation.
 ISO 27001:2013 standard classifies this control into 4 subsections:
 A 12.4.1: Event Logging
 A 12.4.2: Protection of log information
 A 12.4.3: Administrator and Operator logs
 A 12.4.4: Clock synchronization
Software solution company in Indiahttp://www.ifourtechnolab.com
A 12.4.1 Event logging
 Control: Event logs recording user activities, exceptions, faults and information
security events shall be produced, kept and regularly reviewed.
 Register information about access and actions of users, errors, events, etc. in
information systems.
 Send the logs generated by each one of these to a central server.
 Configure a syslog server which allows you to centralize all the logs on a unique
server.
Syslog server is standard for message logging and can operate over a network with a
client-server application structure.
Software solution company in Indiahttp://www.ifourtechnolab.com
A12.4.2 Protection of log information
ISO for Software Outsourcing Companies in India
 Control: Logging facilities and log information shall be protected against tampering
and unauthorized access.
 The logs must be protected, because they cannot be removed or modified by
unauthorized persons.
 Encrypt the event log archive files to ensure the log data is secured for future
forensic analysis, compliance and internal audits by hashing and time stamping the
log data.
 Securely store the archived log data files by employing hashing and time stamping
techniques
Software solution company in Indiahttp://www.ifourtechnolab.com
Control: System administrator and system operator activities shall be logged
and the logs protected and regularly reviewed.
Systems should register information about all users, regardless of the
privileges that they have on the systems.
PUMA (Privileged user monitoring and audit) reports
These are the solutions that closely monitor the user activity of system
administrators and operators and give you detailed security reports for any
specific period of time.
All audit trails should be captured to ensure that the log files that capture the
activities of system administrators and system operators are protected from
unauthorized access and threats.
A 12.4.3 Administrator and Operator logs
Software solution company in Indiahttp://www.ifourtechnolab.com
A 12.4.4 Clock Synchronization
 Control: The clocks of all relevant information processing systems within an
organization or security domain shall be synchronized to a single reference time
source.
 Synchronized clocks are essential for investigating events across multiple systems in
the infrastructure.
 If system clocks are not synchronized it may be difficult to determine whether two events
are related.
 For example an event on one system triggers a failure on second system but the clock on the first
system is behind. In this case the event that triggered the failure will appear to have occurred
after the failure.
 Clock synchronization is important as accurate timestamps on audit log data is critical for
troubleshooting, for event correlation and for use as evidence in legal or disciplinary cases.
ISO for Software Outsourcing Companies in India Software solution company in Indiahttp://www.ifourtechnolab.com
A 12.5 Control of operational software
 Objective: To ensure the integrity of operational systems.
 ISO 27001:2013 classifies it into:
A 12.5.1: Installation of software on operational systems
 A 12.5.1 – Control: Procedures shall be implemented to control the installation of
software on operational systems.
 Whether there are any controls in place for the implementation of software on
operational systems. This is to minimize the risk of corruption of operational
systems.
Software solution company in Indiahttp://www.ifourtechnolab.com
 Objective: To prevent exploitation of technical vulnerabilities.
 A vulnerability is “a weakness of an asset or control that could potentially be
exploited by one or more threats”.
 ISO 27001:2013 standard classifies this into:
A 12.6.1: Management of technical vulnerabilities
A 12.6.2: Restrictions on software installation
 All of the hardware and software on the organization’s network should be scanned
using a vulnerability scanner
To identify weaknesses in the configuration of systems
To determine if any systems are missing important patches, or softwares such as anti-
virus software.
A 12.6 Technical Vulnerability Management
ISO for Software Outsourcing Companies in India
 Control:
 Information about technical vulnerabilities of information systems being used shall be obtained
in a timely fashion.
 The organization’s exposure to such vulnerabilities should be evaluated and appropriate
measures must be taken to address the associated risk.
 A 12.6.1 looks into 3 targets:
 Timely identification of vulnerabilities: the sooner you discover a vulnerability, the more time
you will have to correct it.
 Assessment of organization’s exposure to a vulnerability: A risk assessment should be done to
identify and prioritize those vulnerabilities that are more critical to your assets and business.
 Proper measures considering the associated risks: Risk treatment plan - think about the actions
and allocation of the resources you have to deal with them.
A 12.6.1 Management of technical vulnerabilities
ISO for Software Outsourcing Companies in India
 Control: Rules governing the installation of software by users shall be established and
implemented.
 Here are some of the examples of such rules:
 Employees can not download software from the Internet, or bring software from home without
authorization. It is prohibited.
 When an employee detects the need for use of a particular software, a request needs to be
transmitted to the IT department. The request can be stored as a record or as evidence.
 If the software costs money, an analysis should be made as to whether there is another similar
tool on the market that is cheaper or even free.
 Top management should participate in the decision on the acquisition of new software.
 Once the decision has been made, the IT department will proceed to include the software in
their inventory and will install the software.
A 12.6.2 Restrictions on software installation
Software solution company in Indiahttp://www.ifourtechnolab.com
 Objective: To minimize the impact of audit activities on operational systems.
 ISO 27001:2013 classifies it into:
A 12.7.1: Information systems audit controls
 A 12.7.1: Control – Audit requirements and activities involving verification of
operational systems shall be carefully planned and agreed to minimize disruptions
to business processes.
 So it looks into:
Planning and controlling how the audit activities are carried out.
Minimizing the impact of audit activities on day-to-day operations.
A 12.7 Information systems audit considerations
ISO for Software Outsourcing Companies in India
References
 https://www.sans.org/reading-room/whitepapers/iso17799/security-controls-
service-management-33558
 http://advisera.com/27001academy/blog/2015/11/23/logging-and-monitoring-
according-to-iso-27001-a-12-4/
 https://www.manageengine.com/products/eventlog/iso-27001-compliance-
audit.html
 http://advisera.com/27001academy/blog/2016/02/08/implementing-restrictions-
on-software-installation-using-iso-27001-control-a-12-6-2/
 http://advisera.com/27001academy/blog/2015/10/12/how-to-manage-technical-
vulnerabilities-according-to-iso-27001-control-a-12-6-1/
 http://www.praxiom.com/iso-27002.htm
Software solution company in Indiahttp://www.ifourtechnolab.com

More Related Content

What's hot

Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & complianceVandana Verma
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case StudyPriyanka Aash
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsEnterprise Management Associates
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overviewJulia Urbina-Pineda
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1Tanmay Shinde
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 

What's hot (20)

Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
DLP
DLPDLP
DLP
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
Incident response process
Incident response processIncident response process
Incident response process
 

Similar to ISO 27001 2013 A12 Operations Security Part 2 - by Software development company in india

Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
Security auditing architecture
Security auditing architectureSecurity auditing architecture
Security auditing architectureVishnupriya T H
 
CIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdfCIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdfNesterWare
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET Journal
 
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02technext1
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseRishu Mehra
 
COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxmonicafrancis71118
 
COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxmccormicknadine86
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsIRJET Journal
 
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...Under Controls
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity FrameworkStep-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity FrameworkOnsite Helper
 
Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide	Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide Protect724manoj
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iiiAshish Desai
 

Similar to ISO 27001 2013 A12 Operations Security Part 2 - by Software development company in india (20)

Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Security auditing architecture
Security auditing architectureSecurity auditing architecture
Security auditing architecture
 
AGSL brochure
AGSL brochureAGSL brochure
AGSL brochure
 
CIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdfCIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdf
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data Collection
 
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber Defense
 
COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docx
 
Ch10 Conducting Audits
Ch10 Conducting AuditsCh10 Conducting Audits
Ch10 Conducting Audits
 
COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docx
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
 
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity FrameworkStep-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
 
Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide	Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 

More from iFour Consultancy

Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...iFour Consultancy
 
Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...iFour Consultancy
 
Control a.18 compliance - by software outsourcing company in India
Control a.18  compliance - by software outsourcing company in IndiaControl a.18  compliance - by software outsourcing company in India
Control a.18 compliance - by software outsourcing company in IndiaiFour Consultancy
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaiFour Consultancy
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaiFour Consultancy
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...iFour Consultancy
 

More from iFour Consultancy (6)

Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
 
Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...
 
Control a.18 compliance - by software outsourcing company in India
Control a.18  compliance - by software outsourcing company in IndiaControl a.18  compliance - by software outsourcing company in India
Control a.18 compliance - by software outsourcing company in India
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in india
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in india
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
 

Recently uploaded

Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 

Recently uploaded (20)

Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 

ISO 27001 2013 A12 Operations Security Part 2 - by Software development company in india

  • 1. iFour ConsultancyAnnexure A Control: 12 – Operations Security
  • 2. A 12.4 Logging and Monitoring  Objective: To record events and secure evidence.  Security event logging and monitoring is examining electronic audit logs for indications that  Unauthorized security-related activities have been attempted or performed on a system or application that  Processes  Transmits  Stores confidential information.  Event logging and monitoring assists organizations to determine what has been recorded on their systems for follow-up investigation and if necessary remediation.  ISO 27001:2013 standard classifies this control into 4 subsections:  A 12.4.1: Event Logging  A 12.4.2: Protection of log information  A 12.4.3: Administrator and Operator logs  A 12.4.4: Clock synchronization Software solution company in Indiahttp://www.ifourtechnolab.com
  • 3. A 12.4.1 Event logging  Control: Event logs recording user activities, exceptions, faults and information security events shall be produced, kept and regularly reviewed.  Register information about access and actions of users, errors, events, etc. in information systems.  Send the logs generated by each one of these to a central server.  Configure a syslog server which allows you to centralize all the logs on a unique server. Syslog server is standard for message logging and can operate over a network with a client-server application structure. Software solution company in Indiahttp://www.ifourtechnolab.com
  • 4. A12.4.2 Protection of log information ISO for Software Outsourcing Companies in India  Control: Logging facilities and log information shall be protected against tampering and unauthorized access.  The logs must be protected, because they cannot be removed or modified by unauthorized persons.  Encrypt the event log archive files to ensure the log data is secured for future forensic analysis, compliance and internal audits by hashing and time stamping the log data.  Securely store the archived log data files by employing hashing and time stamping techniques Software solution company in Indiahttp://www.ifourtechnolab.com
  • 5. Control: System administrator and system operator activities shall be logged and the logs protected and regularly reviewed. Systems should register information about all users, regardless of the privileges that they have on the systems. PUMA (Privileged user monitoring and audit) reports These are the solutions that closely monitor the user activity of system administrators and operators and give you detailed security reports for any specific period of time. All audit trails should be captured to ensure that the log files that capture the activities of system administrators and system operators are protected from unauthorized access and threats. A 12.4.3 Administrator and Operator logs Software solution company in Indiahttp://www.ifourtechnolab.com
  • 6. A 12.4.4 Clock Synchronization  Control: The clocks of all relevant information processing systems within an organization or security domain shall be synchronized to a single reference time source.  Synchronized clocks are essential for investigating events across multiple systems in the infrastructure.  If system clocks are not synchronized it may be difficult to determine whether two events are related.  For example an event on one system triggers a failure on second system but the clock on the first system is behind. In this case the event that triggered the failure will appear to have occurred after the failure.  Clock synchronization is important as accurate timestamps on audit log data is critical for troubleshooting, for event correlation and for use as evidence in legal or disciplinary cases. ISO for Software Outsourcing Companies in India Software solution company in Indiahttp://www.ifourtechnolab.com
  • 7. A 12.5 Control of operational software  Objective: To ensure the integrity of operational systems.  ISO 27001:2013 classifies it into: A 12.5.1: Installation of software on operational systems  A 12.5.1 – Control: Procedures shall be implemented to control the installation of software on operational systems.  Whether there are any controls in place for the implementation of software on operational systems. This is to minimize the risk of corruption of operational systems. Software solution company in Indiahttp://www.ifourtechnolab.com
  • 8.  Objective: To prevent exploitation of technical vulnerabilities.  A vulnerability is “a weakness of an asset or control that could potentially be exploited by one or more threats”.  ISO 27001:2013 standard classifies this into: A 12.6.1: Management of technical vulnerabilities A 12.6.2: Restrictions on software installation  All of the hardware and software on the organization’s network should be scanned using a vulnerability scanner To identify weaknesses in the configuration of systems To determine if any systems are missing important patches, or softwares such as anti- virus software. A 12.6 Technical Vulnerability Management ISO for Software Outsourcing Companies in India
  • 9.  Control:  Information about technical vulnerabilities of information systems being used shall be obtained in a timely fashion.  The organization’s exposure to such vulnerabilities should be evaluated and appropriate measures must be taken to address the associated risk.  A 12.6.1 looks into 3 targets:  Timely identification of vulnerabilities: the sooner you discover a vulnerability, the more time you will have to correct it.  Assessment of organization’s exposure to a vulnerability: A risk assessment should be done to identify and prioritize those vulnerabilities that are more critical to your assets and business.  Proper measures considering the associated risks: Risk treatment plan - think about the actions and allocation of the resources you have to deal with them. A 12.6.1 Management of technical vulnerabilities ISO for Software Outsourcing Companies in India
  • 10.  Control: Rules governing the installation of software by users shall be established and implemented.  Here are some of the examples of such rules:  Employees can not download software from the Internet, or bring software from home without authorization. It is prohibited.  When an employee detects the need for use of a particular software, a request needs to be transmitted to the IT department. The request can be stored as a record or as evidence.  If the software costs money, an analysis should be made as to whether there is another similar tool on the market that is cheaper or even free.  Top management should participate in the decision on the acquisition of new software.  Once the decision has been made, the IT department will proceed to include the software in their inventory and will install the software. A 12.6.2 Restrictions on software installation Software solution company in Indiahttp://www.ifourtechnolab.com
  • 11.  Objective: To minimize the impact of audit activities on operational systems.  ISO 27001:2013 classifies it into: A 12.7.1: Information systems audit controls  A 12.7.1: Control – Audit requirements and activities involving verification of operational systems shall be carefully planned and agreed to minimize disruptions to business processes.  So it looks into: Planning and controlling how the audit activities are carried out. Minimizing the impact of audit activities on day-to-day operations. A 12.7 Information systems audit considerations ISO for Software Outsourcing Companies in India
  • 12. References  https://www.sans.org/reading-room/whitepapers/iso17799/security-controls- service-management-33558  http://advisera.com/27001academy/blog/2015/11/23/logging-and-monitoring- according-to-iso-27001-a-12-4/  https://www.manageengine.com/products/eventlog/iso-27001-compliance- audit.html  http://advisera.com/27001academy/blog/2016/02/08/implementing-restrictions- on-software-installation-using-iso-27001-control-a-12-6-2/  http://advisera.com/27001academy/blog/2015/10/12/how-to-manage-technical- vulnerabilities-according-to-iso-27001-control-a-12-6-1/  http://www.praxiom.com/iso-27002.htm Software solution company in Indiahttp://www.ifourtechnolab.com

Editor's Notes

  1. Software Development Company in india – http://www.ifourtechnolab.com
  2. Software Development Company in india – http://www.ifourtechnolab.com
  3. Software Development Company in india – http://www.ifourtechnolab.com
  4. Software Development Company in india – http://www.ifourtechnolab.com
  5. Software Development Company in india – http://www.ifourtechnolab.com
  6. Software Development Company in india – http://www.ifourtechnolab.com
  7. Software Development Company in india – http://www.ifourtechnolab.com
  8. Software Development Company in india – http://www.ifourtechnolab.com
  9. Software Development Company in india – http://www.ifourtechnolab.com
  10. Software Development Company in india – http://www.ifourtechnolab.com
  11. Software Development Company in india – http://www.ifourtechnolab.com
  12. Software Development Company in india – http://www.ifourtechnolab.com