Presentation ISMS ISO IEC 27001 2022
Presentation ISMS ISO IEC 27001 2022
Presentation ISMS ISO IEC 27001 2022
Information security
management system
ISO/IEC 27001:2022
INFORMATION SECURITY MANAGEMENT SYSTEM
Course structure
Introductive part
Confidentiality
Integrity
Availability
ISO/I EC 27001
Requirements for an I SMS.
International standard.
Documented
ROLES, RESPONSIBILITIES, AUTHORITIES
The top management shall ensure that responsibilities
and authorities for roles relevant to information
security are assigned and communicated.
Likelihood Description
Almost certain The risk source will most certainly reach its objective by using one of the considered methods of
attack. The likelihood of this risk scenario is very high.
Very likely The risk source will probably reach its objective by using one of the considered methods of
attack. The likelihood of this risk scenario is high.
Likely The risk source is able to reach its objective by using one of the considered methods of attack.
The likelihood of this risk scenario is significant.
Rather unlikely The risk source has relatively little chance of reaching its objective by using one of the considered
methods of attack. The likelihood for this risk scenario is low.
Unlikely The risk source has very little chance of reaching its objective by using one of the considered
methods of attack. The likelihood for this risk scenario is very low.
INFORMATION SECURITY RISK ASSESSMENT
Likelihood Consequences
Catastrophic Critical Serious Significant Minor
Almost certain Very high Very high High High Medium
Very likely Very high High High Medium Medium
Likely High High Medium Medium Medium
Rather unlikely Medium Medium Medium Medium Low
Unlikely Medium Medium Medium Low Low
INFORMATION SECURITY
RISK ASSESSMENT
Repeated information security risk assessments
should produce consistent, valid and comparable
results.
Risk identification approaches: event-based and
asset-based.
THREATS AND VULNERABILITIES
Threat Threat description Vulnerability Vulnerability description
category category
Fire Insufficient maintenance/ faulty installation of storage media
Physical threats Water Hardware Insufficient periodic replacement schemes for equipment
Pollution, harmful radiation Susceptibility to humidity, dust, soiling
Climatic phenomenon No or insufficient software testing
Natural threats Seismic phenomenon Well-known flaws in the software
Volcanic phenomenon Software
No “logout” when leaving the workstation
Failure of a supply system Disposal or reuse of storage media without proper erasure
Infrastructure
Failure of cooling or ventilation system Insufficient mechanisms for the proof of sending or receiving a
failures
Loss of power supply message
Failure of device or system Network
Unprotected communication lines
Technical Saturation of the information system Unprotected sensitive traffic
failures Violation of information system Absence of personnel
maintainability Personnel Inadequate recruitment procedures
Terror attack, sabotage Insufficient security training
Social engineering Inadequate or careless use of physical access control to
Interception of radiation of a device buildings and rooms
Human actions
Remote spying Location in an area susceptible to flood
Eavesdropping Site
Unstable power grid
Theft of media or documents Insufficient physical protection of the building, doors and
Error in use windows
Compromise of
Abuse of rights or permissions Formal procedure for user registration and de-registration not
functions or
Forging of rights or permissions
services developed, or its implementation ineffective
Denial of actions
Formal process for access rights review not developed, or its
Lack of staff Organization
implementation is ineffective
Organizational Lack of resources
Insufficient security provisions in contracts with customers
threats Failure of service providers
and third parties
Violation of laws or regulations
Assess possible consequences and Compare the results of the risk analysis
realistic likelihood for the risks with the acceptance criteria.
identified to determine the level of risk.
Preventive
Detective
Corrective
STATEMENT OF APPLICABILITY (SoA)
Information security control Included or not Justification for inclusion Implementation Justification for exclusion
status
5.1 Policies for information Included The control is needed to Implemented //
security treat the information
security risks identified
5.2 Information security Included The control is needed to Implemented //
roles, responsibilities and treat the information
authorities security risks identified
5.3 Segregation of duties Included The control is needed to Partially //
treat the information implemented
security risks identified
…
8.30 Outsourced Not included // // All development is done in
development house. No outsourcing of
system development.
RISK TREATMENT
PLAN
For each information security risk:
- treatment option(s);
- actions to treat the risk;
- status of implementation;
- responsibilities, resources, timeframes.
INFORMATION SECURITY
RISK TREATMENT
Define requirements.
Ensure competency (education, training, experience).
Act to improve or maintain competence.
Evaluate the effectiveness of actions.
Retain documented
information (evidence of
competence)
AWARENESS
On what?
When?
With whom?
How?
DOCUMENTED INFORMATION
Distribution
Access
Retrieval
Use
Storage and preservation
Version control
Retention
Secure disposition
OPERATIONAL
PLANNING AND
CONTROL
The organization shall plan, implement
and control the processes needed to
meet requirements.
Control changes.
Control externally provided processes,
products or services.
INFORMATION SECURITY
RISK ASSESSMENT AND TREATMENT
Conduct information security risk assessments at planned
intervals (possibly once per year), and in case of
significant changes.
Documented information as
evidence of the results.
INTERNAL AUDIT
Documented information as
evidence of internal audits.
MANAGEMENT REVIEW
INPUTS RESULTS
Status of actions from previous reviews. Decisions related to continual improvement.
Changes to the context of the organization. Changes to the ISMS.
Feedback on the information security performance.
Feedback from interested parties.
Results of the risk assessment and risk treatment plan.
Opportunities for improvement.
Nonconformity – non-fulfilment
of a requirement.
MANAGING NONCONFORMITIES
React Correct and control the situation, deal with the consequences.
Documented information on
nonconformities and corrective actions
INFORMATION SECURITY CONTROLS
Organizational controls
People controls
Physical controls
Technological controls
POLICIES FOR INFORMATION SECURITY
Organizational control 5.10 Acceptable use of information and other associated assets
Identify, document and implement rules for the acceptable use and procedures for handling
information and other associated assets.
For information
on any support.
INFORMATION TRANSFER
Organizational control 5.14 Information transfer
Ensure that rules, procedures or agreements are in place for the transfer
of information within the organization and between the organization and
other parties, for all types of transfer facilities.
Ensure that only authorized users have access to information and associated assets.
Separate the approval of access rights from their implementation.
Review access rights periodically and make the necessary adjustments.
INFORMATION SECURITY IN
SUPPLIER RELATIONSHIPS
Organizational control 5.19 Information security in supplier relationships
Define and implement processes and procedures to manage the information
security risks that are associated with the use of products and services obtained
from suppliers.
Organizational control 5.22 Monitoring, review and change management of supplier services
Regularly monitor, review, evaluate and manage change in supplier information security practices and
service delivery.
Event ≠ Incident
Method for reporting information security events.
Process for managing information security incidents.
ASSESSMENT AND DECISION
The lessons learned while dealing with security incidents can prove
useful for preventing future incidents and for improving the response of
the organization.
COLLECTION OF EVIDENCE
To prevent hiring the wrong person and to ensure personnel remain suitable for the job.
The screening applies to all who work for the company (employees, consultants, free-
lancers, temporary staff, etc.).
TERMS AND CONDITIONS FOR EMPLOYMENT
Consider for inclusion in contracts the rules for access control, return of assets,
protection of information in accordance with its classification level, the transfer
of information, the relationship with suppliers, non-disclosure requirements or a
mention of the disciplinary process.
AWARENESS, TRAINING AND EDUCATION
People control 6.3 Information security awareness, training and education
Ensure that personnel and relevant interested parties receive appropriate information security
awareness, education and training, and regular updates of the organization’s information
security policy, topic-specific policies and procedures, as relevant for their job functions.
Awareness refers to all who work for the organization, and it should focus also
on “why” and not only on “what”.
The education and training refer mainly to the technical personnel who need
specific knowledge and skills.
DISCIPLINARY PROCESS
People control 6.4 Disciplinary process
Establish and communicate a disciplinary process to take actions against personnel and other
interested parties who have committed an information security policy violation.
Not all areas of the organization have the same importance in terms
of information security.
PHYSICAL ENTRY
Authenticate users who request access to information and correlate the strength
of authentication with the classification of the information to be accessed.
CAPACITY MANAGEMENT
Technological control 8.6 Capacity management
Monitor and adjust the use of resources in line with current and expected
capacity requirements.
ISO/IEC 27033 –
Network security
SECURITY OF NETWORK SERVICES
Split large networks into separate domains and control the traffic
between the domains.
Wireless networks require special attention.
WEB FILTERING
Consider and address the risks related to the product (obtained from
outsourced development arrangements) as well as the risks in
relation to the provider of outsourced development.
SEPARATION OF ENVIRONMENTS
Reduce the impact that audits and other assurance activities may
have on operational systems and business processes.
ISO/IEC 27001 CERTIFICATION
FOR ORGANIZATIONS
Involves an examination.
Usually different levels – practitioner,
implementer, auditor, etc.
THANK YOU!