SlideShare a Scribd company logo
1 of 15
ISO 27001 :2022
Standards/Clauses
What is ISO Audit?
1
ISO Certification
2
WHY ISO ? Purpose of clauses!
3
Today’s Agenda
4 Audit stages
6 Introduction Controls
5 Introduction to ISO Clauses & Understanding of clauses
What is ISO Audit & what it includes?
● Audit of your organization's compliance with one of the standards set forth by the
International Organization for Standardization (ISO).
● To demonstrate complete credibility — and reliability.
● ISO/IEC 27001 standards offer specific requirements to ensure that data management is
secure and the organization has defined an information security management system
(ISMS).
● Implemented management controls, to confirm the security of proprietary data.
ISO 27001 certification applies to?
IT Industries
FInance Sector
Healthcare Sector
Government Sector
Telecom Industries
Why ISO 27001, Purpose of clauses ?
Why ISO?
● International Best Practises
● Identity of risk & appropriate mitigation
● Customer satisfaction on confidentiality of data
● Performance
● Regulatory compliance requirements
● Safeguarded information assets
● Competency of employees & management process
Purpose of clauses?
- To protect CIA of information/Assets
- To identify and effectively manage their information security risks
Audit Stages
■ Plan – Identify the problems and collect useful
information to evaluate security risk.
■ Do – Implement the planned security policies and
procedures.
■ Check – Monitor the effectiveness of ISMS policies
Evaluate tangible outcomes
■ Act – Continual Improvement
Context of
organization
Leadership
Planning
Operation
Performance
Evaluation
Improvement
ISO
27001:2022
Clause
4
Context of
Organization
4.1. Organization & context
- Identifications of internal & external issues in organization to identify
the risk & mitigate
4.2. Understand needs & expectation of interested parties
4.3. Determining scope, Documented scope
5
Leadership
5.1 Leadership & commitment:
How they can demonstrate leadership to achieve ISMS, By:
a) ensuring the information security policy and the information security
objectives are established and are compatible with the strategic direction of
the organisation
b) ensuring the integration of the information security management system
requirements into the organisation’s processes;
c) ensuring that the resources needed for the information security
management system are available
d) communicating the importance of effective information security
management and of conforming to the information security management
system requirements;
e) ensuring that the information security management system achieves its
intended outcome
f) continual improvement in the process of implementing ISMS
5.2 Policy
- establishment and maintenance of an information security policy
5.3 Organization’s Roles, responsibilities & Authorities
6
Planning
6.1 Actions to address risks and opportunities
- Build your information security management system (ISMS)
- Implement your risk management policy
- Implement your risk management process
- Manage your risk via a risk register
- Effectively and regularly report to the Management Review Team
6.2 Information security objectives and planning to achieve them
- The organisation shall establish information security objectives at
relevant functions and levels
- The organization shall retain documented information on the
information security objectives. When planning how to achieve its
information security objectives.
6.3 Planning of changes
7. Support
7.1 Resources
7.2 Competence
7.3 Awareness
7.4 Communication
7.5 Documented information
8. Operation
8.1 Operational planning and control
– establishing criteria for processes
– implementing control of the processes in accordance
with the criteria
8.2 Information security risk assessment
8.3 Information security risk treatment
9. Performance Evaluation
9.1 Monitoring, measurement, analysis and
evaluation
9.2 Internal Audit
9.3 Management review
10. Improvement
10.1 Continual improvement measurement,
analysis and evaluation
10.2 Nonconformity and corrective action
Controls
Physical Controls
Natural disaster
Single entry point
CCTV camera
surveillance
24×7 on-site security
guards
Uninterruptible
Power Supply
Security of
information assets
Authorized Entry point
Internet access
control
Organizational control : Threat Intelligence
❖ What is Threat intelligence in ISO & What the purpose is?
Operational
HOW & WHERE?
3
1
2
Tactical
WHAT?
Strategic
WHO & WHY
3 Level of Threat
intelligence
1. Strategic Threat Intelligence: high level
information about the threat landscape
1. Tactical Threat Intelligence: intelligence on
tools, techniques and attack methodologies
1. Operational Threat Intelligence: intelligence
on specific attacks and indicators

More Related Content

What's hot

ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001technakama
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListSriramITISConsultant
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingOperational Excellence Consulting
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowPECB
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMSBusiness Beam
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdfControlCase
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewNaresh Rao
 

What's hot (20)

ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_List
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
Iso 27001 2013
Iso 27001 2013Iso 27001 2013
Iso 27001 2013
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
Isms
IsmsIsms
Isms
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdfISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdf
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
ISO 27002-2022.pdf
ISO 27002-2022.pdfISO 27002-2022.pdf
ISO 27002-2022.pdf
 

Similar to ISO_ 27001:2022 Controls & Clauses.pptx

541728869-Introduction-to-ISO-27001.pdf
541728869-Introduction-to-ISO-27001.pdf541728869-Introduction-to-ISO-27001.pdf
541728869-Introduction-to-ISO-27001.pdfSharudinBoriak1
 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptxSuman Garai
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirementshumanus2
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Poster
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness PosterISO/IEC 27001:2022 (Information Security Management Systems) Awareness Poster
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness PosterOperational Excellence Consulting
 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCPECB
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Yerlin Sturdivant
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Chandan Singh Ghodela
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentationPranay Kumar
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxssuser00d6eb
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part Ikhushboo
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptxPrashant Singh
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.pptHasnolAhmad2
 
CQI-IRCA 27001:2013 Lead Auditor Course
CQI-IRCA 27001:2013  Lead Auditor Course CQI-IRCA 27001:2013  Lead Auditor Course
CQI-IRCA 27001:2013 Lead Auditor Course Desmond Muchetu
 
Basics to ISO 27001 by Manula Udugahapattuwa
Basics to ISO 27001 by Manula Udugahapattuwa Basics to ISO 27001 by Manula Udugahapattuwa
Basics to ISO 27001 by Manula Udugahapattuwa Manula Udugahapattuwa
 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business ValueHyTrust
 

Similar to ISO_ 27001:2022 Controls & Clauses.pptx (20)

541728869-Introduction-to-ISO-27001.pdf
541728869-Introduction-to-ISO-27001.pdf541728869-Introduction-to-ISO-27001.pdf
541728869-Introduction-to-ISO-27001.pdf
 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Poster
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness PosterISO/IEC 27001:2022 (Information Security Management Systems) Awareness Poster
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Poster
 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRC
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptx
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
CQI-IRCA 27001:2013 Lead Auditor Course
CQI-IRCA 27001:2013  Lead Auditor Course CQI-IRCA 27001:2013  Lead Auditor Course
CQI-IRCA 27001:2013 Lead Auditor Course
 
Basics to ISO 27001 by Manula Udugahapattuwa
Basics to ISO 27001 by Manula Udugahapattuwa Basics to ISO 27001 by Manula Udugahapattuwa
Basics to ISO 27001 by Manula Udugahapattuwa
 
Infosec Audit Lecture_4
Infosec Audit Lecture_4Infosec Audit Lecture_4
Infosec Audit Lecture_4
 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business Value
 

Recently uploaded

(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...gurkirankumar98700
 
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...Suhani Kapoor
 
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service BhiwandiVIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service BhiwandiSuhani Kapoor
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girlsshivangimorya083
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceSanjay Bokadia
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...Suhani Kapoor
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Madekojalkojal131
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳anilsa9823
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdftheknowledgereview1
 
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012sapnasaifi408
 
Internshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateInternshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateSoham Mondal
 
Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchSoham Mondal
 
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceanilsa9823
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士obuhobo
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 

Recently uploaded (20)

(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
 
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
 
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service BhiwandiVIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
VIP Call Girl Bhiwandi Aashi 8250192130 Independent Escort Service Bhiwandi
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector Experience
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdf
 
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
 
Internshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateInternshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University Certificate
 
Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India Research
 
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
 

ISO_ 27001:2022 Controls & Clauses.pptx

  • 2. What is ISO Audit? 1 ISO Certification 2 WHY ISO ? Purpose of clauses! 3 Today’s Agenda 4 Audit stages 6 Introduction Controls 5 Introduction to ISO Clauses & Understanding of clauses
  • 3. What is ISO Audit & what it includes? ● Audit of your organization's compliance with one of the standards set forth by the International Organization for Standardization (ISO). ● To demonstrate complete credibility — and reliability. ● ISO/IEC 27001 standards offer specific requirements to ensure that data management is secure and the organization has defined an information security management system (ISMS). ● Implemented management controls, to confirm the security of proprietary data.
  • 4. ISO 27001 certification applies to? IT Industries FInance Sector Healthcare Sector Government Sector Telecom Industries
  • 5. Why ISO 27001, Purpose of clauses ? Why ISO? ● International Best Practises ● Identity of risk & appropriate mitigation ● Customer satisfaction on confidentiality of data ● Performance ● Regulatory compliance requirements ● Safeguarded information assets ● Competency of employees & management process Purpose of clauses? - To protect CIA of information/Assets - To identify and effectively manage their information security risks
  • 6. Audit Stages ■ Plan – Identify the problems and collect useful information to evaluate security risk. ■ Do – Implement the planned security policies and procedures. ■ Check – Monitor the effectiveness of ISMS policies Evaluate tangible outcomes ■ Act – Continual Improvement
  • 8. 4 Context of Organization 4.1. Organization & context - Identifications of internal & external issues in organization to identify the risk & mitigate 4.2. Understand needs & expectation of interested parties 4.3. Determining scope, Documented scope
  • 9. 5 Leadership 5.1 Leadership & commitment: How they can demonstrate leadership to achieve ISMS, By: a) ensuring the information security policy and the information security objectives are established and are compatible with the strategic direction of the organisation b) ensuring the integration of the information security management system requirements into the organisation’s processes; c) ensuring that the resources needed for the information security management system are available d) communicating the importance of effective information security management and of conforming to the information security management system requirements; e) ensuring that the information security management system achieves its intended outcome f) continual improvement in the process of implementing ISMS 5.2 Policy - establishment and maintenance of an information security policy 5.3 Organization’s Roles, responsibilities & Authorities
  • 10. 6 Planning 6.1 Actions to address risks and opportunities - Build your information security management system (ISMS) - Implement your risk management policy - Implement your risk management process - Manage your risk via a risk register - Effectively and regularly report to the Management Review Team 6.2 Information security objectives and planning to achieve them - The organisation shall establish information security objectives at relevant functions and levels - The organization shall retain documented information on the information security objectives. When planning how to achieve its information security objectives. 6.3 Planning of changes
  • 11. 7. Support 7.1 Resources 7.2 Competence 7.3 Awareness 7.4 Communication 7.5 Documented information 8. Operation 8.1 Operational planning and control – establishing criteria for processes – implementing control of the processes in accordance with the criteria 8.2 Information security risk assessment 8.3 Information security risk treatment
  • 12. 9. Performance Evaluation 9.1 Monitoring, measurement, analysis and evaluation 9.2 Internal Audit 9.3 Management review 10. Improvement 10.1 Continual improvement measurement, analysis and evaluation 10.2 Nonconformity and corrective action
  • 14. Physical Controls Natural disaster Single entry point CCTV camera surveillance 24×7 on-site security guards Uninterruptible Power Supply Security of information assets Authorized Entry point Internet access control
  • 15. Organizational control : Threat Intelligence ❖ What is Threat intelligence in ISO & What the purpose is? Operational HOW & WHERE? 3 1 2 Tactical WHAT? Strategic WHO & WHY 3 Level of Threat intelligence 1. Strategic Threat Intelligence: high level information about the threat landscape 1. Tactical Threat Intelligence: intelligence on tools, techniques and attack methodologies 1. Operational Threat Intelligence: intelligence on specific attacks and indicators

Editor's Notes

  1. The only way for an organization to demonstrate complete credibility — and reliability — in regard to information security best practices and processes is to gain certification against the criteria specified in the ISO/IEC 27001 information security standard. Additionally, it requires that management controls have been implemented, in order to confirm the security of proprietary data.
  2. Plan – Identify the problems and collect useful information to evaluate security risk. Define the policies and processes that can be used to address problem root causes. Develop methods to establish continuous improvement in information security management capabilities. Do – Implement the planned security policies and procedures. The implementation follows the ISO standards, but actual implementation is based on the resources available to organization. Check – Monitor the effectiveness of ISMS policies and controls. Evaluate tangible outcomes as well as behavioural aspects associated with the ISMS processes. Act – Focus on continuous improvement. Take corrective and preventive actions, based on the results of the internal ISMS audit and management review or other relevant information, to achieve continual improvement of the ISMS.
  3. 4. Context of organization : focuses on overall environment of the functions of organization. Identifications of internal & external issues in organization to identify the risk & mitigate we can define issues here as factor that can impact the ISMS. eg : internal factor can be organization’s policies and processes where as external factor can be market competition. Eg : internal issues: many employees are with less capability in organization so here, what is the risk? - the risk is employee with less capability can not protect the information . So when we know what is risk then we can find out how we can mitigate the risk. Using som procedure/training we can mitigate the risk for information assets. Eg : External issues : External competition Suppose your field is getting rapidly innovative and rapidly changes are happening in the market. So it can be a risk to the organization. As organization also should have take steps to keep updated as per market. so , here the action plan can be like : organization can provide training depends on the innovative market. Organizations have to find out all interested parties and they have to know their requirement, needs & expectations and accordingly they can take actions to fulfill the requirements. Because, when organization will fulfill these requirements to interested parties they will favour back and then organization can achieve its purpose of ISMS. Eg : employees are interested parties for organization. So organization have to fulfill their need like - salary should be given in proper period. You should have documented scope which you have determined. 5. Leadership emphasises the importance of information security being supported, both visibly and materially, by senior management. This clause identifies specific aspects of the management system where top management are expected to demonstrate both leadership and commitment 5.1 Leadership & commitment You will write your information security policy and your associated information security policies based on the needs of the business and the risks the business faces. These are defined as part of the process of building your information security management system (ISMS). And objectives which we set should be measurable & realistic in a way to Eg: Ensuring service availability to our customer of 99.9% Implementation of ISMS is a change in the organization. There will be requirements that have to be integrated into organization’s process and these should be identified early during analysis. Humans resource: It is the responsibility of top management to ensure proper resource allocation to the project Budget : in order to get staff up to training and capability development will be required. For any consultation charges requires a budget which tope management must approve of. This can be achieved through different ways: An communication email to all staff An acceptable usage agreement signed by all staff members Within the info security policy itself Top management provide oversight and governance through out the ISMS and not only during implementation phase. Top management can demonstrate their commitment to continual improvementthrough management review meetings where they review performance of ISMS. 5.2 Policy It focuses on the establishment and maintenance of an information security policy within an organization's information security management system (ISMS). The organization is required to establish an information security policy that is appropriate to its context. The policy should define the organization's overall intentions and direction for information security, including the protection of information assets, compliance with legal and regulatory requirements, and the commitment to continual improvement. 5.3 Organization’s Roles, responsibilities & Authorities Top management shall ensure that the responsibilities and authorities for roles relevant to information security are assigned and communicated within the organisation.That will ensure that the management system is effective. 6. Planning this is about having a plan for the information security management system that addresses actions to address risks and opportunities - How to plan for risk management Defining and applying a risk assessment process. Defining and applying a risk treatment process. the information security objectives and planning to achieve them - Defining objectives and planning how to achieve them. Planning for changes - Planning for changes to the information security management system rather than reacting 6.1 Actions to address risks and opportunities Build your information security management system (ISMS) Using the ISO 27001 Toolkit to fast track your implementation, build your information security management system following the step by step guides and videos. Implement your risk management policy Implement the risk management policy that sets out what you do for risk management and what your risk appetite is. Implement your risk management process Implement your risk management process that shows how you manage risk, how you identify risk, how you asses risk, how you accept risk and the different levels of risk acceptance. Manage your risk via a risk register Implement a risk register that allows you to fully manage, record and report on risk including residual risk. Effectively and regularly report to the Management Review Team Ensure that you report to the Management Review at least once a quarter and follow the structured management team meeting agenda as dictated by the ISO 27001 standard. 6.2 information security objectives and planning to achieve them The information security objectives shall: a) be consistent with the information security policy; b) be measurable (if practicable); c) take into account applicable information security requirements, and risk assessment and risk treatment results; d) be monitored e) be communicated f) be updated as appropriate. g) be available as documented information The organization shall retain documented information on the information security objectives. When planning how to achieve its information security objectives, the organisation shall determine; h ) what will be done; i) what resources will be required; j) who will be responsible; k) when it will be completed; and l) how the results will be evaluated. 6.3 Planning of changes : When the organisation determines the need for changes to the information security management system, the changes shall be carried out in a planned manner. 7. Support 7.1 Resources : It focuses to provide sufficient & good level of resource for establishment, implementation, maintenance & continual improvement of ISMS 7.2 Competency : The organisation as a whole has departments that contributes to the success of the organisation that also play into an effective role into information security management system. We can consider HR, legal and regulatory compliance, commercial, and Information Technology (IT) teams. This Standard defines as:The organisation shall: a) determine the necessary competence/capability of person(s) doing work under its control that affects its information security performance; b) ensure that these persons are competent on the basis of appropriate education, training, or experience; c) where applicable, take actions to acquire the necessary competence, and evaluate the effectiveness of the actions taken; and d) retain appropriate documented information as evidence of competence. 7.3 Awareness: It focuses on awareness that employee should have : Persons doing work under the organisation’s control shall be aware of: a) the information security policy; b) their contribution to the effectiveness of the information security management system, including the benefits of improved information security performance; 7.4 Communication : The organisation shall determine the need for internal and external communications relevant to the information security management system including: a) on what to communicate; b) when to communicate; c) with whom to communicate; 7.5 Information should be documented : documented information determined by the organisation as being necessary for the effectiveness of the ISMS 8. Operational: 8.1 Operational planning & control: The organisation shall plan, implement and control the processes needed to meet information security requirements, and to implement the actions determined in clause 6.1 this is done by by – establishing criteria for processes and – implementing control of the processes in accordance with the criteria The organization also Plan to achieve information security objective. Documented information shall be available to the extent necessary to have confidence that the processes have been carried out as planned. 8.2 Security Risk assessment: The organisation shall perform information security risk assessments at planned intervals or when significant changes are proposed 8.3 Security risk treatment : The organisation shall implement the information security risk treatment plan. Risk treatment : the process of selecting and implementing of measures to modify risk Eg : installing fire alarms to mitigate the risk of fire within a building 9. Performance evaluation: 9.1 monitoring, measurement, analysis : give guidance on the methods of monitoring, measurement, analysis and evaluation and provides that they should produce comparable results and reproducible results to be considered valid. This was previously a footnote so no material change. 9.2 Internal Audit: The organisation shall conduct internal audits at planned intervals to provide information on whether the ISMS: Organisation shall fulfill requirements to achieve ISMS standards The organisation shall plan, establish, implement and maintain an audit programme(s), including the frequency, methods, responsibilities, planning requirements and reporting 9.3 Management Review : Top management shall review the organization’s information security management system at planned intervals to ensure its continuing suitability, adequacy and effectiveness. The results of the management review shall include decisions related to continual improvement opportunities and any needs for changes to the ISMS. 10. Continual improvement: The organisation shall continually improve the suitability, adequacy and effectiveness of the information security management system. This applies, If any loops holes found in the process of fulfilling ISMS standards