Information Security Review
Information Security Review
Control Statement
The organization’s approach to managing information security and its
implementation including people, processes and technologies should be
reviewed independently at planned intervals, or when significant changes
occur.
Requirement
An organization implements processes and technologies to comply with the
requirements and controls of the ISMS as per ISO 27001 and ISO 27002. In
addition to a self-assessment it is important that an organization gets an
independent review done to check the suitability, adequacy and effectiveness
of the controls and processes it has implemented to manage information
security. The reviewer can be internal or external but should be independent.
Implementation
As with all business activities, the organization’s approach to information
security and its implementation should be reviewed from time to time to
ensure everything is still suitable and effective.
Independent review can be conducted by a party that is not responsible for
implementation or operations of information security, generally its an
independent internal audit team. Organization should plan a periodic
independent review (internal audit) and include it in Internal audit charter.
cont. ....
https://www.linkedin.com/in/dipendas1979/
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 5.35 INDEPENDENT REVIEW OF INFORMATION SECURITY
….cont.
The results should be shared with the top management (initiator of the
review) to provide assurance to management that the organization’s ISMS
practices are adequate and effective and top management should drive the
closure of the gaps via an “Issue Management Procedure”.
At the end of review the reviewers should record and submit a formal Gap
Analysis and Noncompliance report to the management. The scope of the
review is to ensure that all the requirements of ISO 27001 clauses and
controls are met i.e. approach and processes to manage information security
are adequate, aligned with ISO 27001 and in accordance with what is stated
in the Information Security Policy and other policies and ISMS guidelines.
In case documented objectives and requirements are not met the reviewer
should document the same as a gap and highlight the same in the “report” to
the management.
The ISMS team should then plan to close all the highlighted gaps via an
“issue management process”
Additional reviews should be carried out when major changes are planned or
unplanned major changes are triggered.
ISO 27007 - Guidelines for information security management systems auditing provides
guidance on managing an information security management system (ISMS) audit
programme and on conducting audits
ISO 27008 - Guidelines for the assessment of information security controls provides
guidance on reviewing and assessing the implementation and operation of information
security controls, including the technical assessment of information system controls
https://www.linkedin.com/in/dipendas1979/