Information Security Implementation Guide
Information Security Implementation Guide
Implementation Guide
Presidio Information
Information Security Implementation Guide PAGE 2
Summary
Information assets, including data and information systems, need to be protected from
security threats. To protect their information assets & facilities need to design, implement,
and maintain an information security program.
The guidance provided in this document is based on international standards, best practices,
and the experience of the information security, cyber security, and physical security experts
on the document writing team.
It provides recommendations on best practices for information security and high-value
security controls & Information Security Management System Planning for any organisation
focuses on information security planning. It describes a risk-based approach for planning
information security programs based on the sensitivity of the data developed, processed,
communicated, and stored on facility information systems.
Information Security Implementation Guide PAGE 3
IMPLEMENTATION GUIDANCE
INDEX
ISO 27001 Requirements
The organization determines external and internal issues relevant to its purpose and affecting its ability to
realize the intended outcome(s) of the knowledge security management system (ISMS).
Explanation
As an integral function of the ISMS, the organization continually analyses itself and therefore the world
surrounding it. This analysis cares with external and internal issues that in how affect information security and
the way information security are often managed, which are relevant to the organization’s objectives.
g) The capabilities, in terms of resources and knowledge (e.g., capital, time, persons, processes, systems and
technologies);
h) Physical infrastructure and environment;
i) Information systems, information flows and deciding processes (both formal and informal);
j) Previous audits and former risk assessment results.
Based on an understanding of the organization’s purpose (e.g., pertaining to its mission statement or business
plan) also because the intended outcome(s) of the organization’s ISMS, the organization should:
— Review the external environment to spot relevant external issues; and review the interior aspects to spot
relevant internal issues. In order to spot relevant issues, the subsequent question is often asked:
Example 1 on governance and organizational structure; When establishing an ISMS, already existing
governance and organizational structures should be taken under consideration. As an example, the
organization can model the structure of its ISMS supported the structure of other existing management
systems, and may combine common functions, like management review and auditing.
Example 2 on policy, objectives and methods: An analysis of existing policies, objectives and methods, can
indicate what the organization intends to realize and the way the knowledge security objectives are often
aligned with business objectives to make sure successful outcomes.
Example 3 on information systems and knowledge flows: When determining internal issues, the organization
should identify, at a sufficient level of detail, the knowledge flows between its various information systems.
As both the external and therefore the internal issues will change over time, the problems and their influence
on the scope, constraints and requirements of the ISMS should be reviewed regularly. Documented
information on this activity and its outcome is mandatory only within the form and to the extent that the
organization determines as necessary for the effectiveness of its management system.
Explanation
Interested party may be a defined term that refers to persons or organizations which will affect, be suffering
from, or perceive themselves to be suffering from a choice or activity of the organization. Interested parties
are often found both outside and inside the organization and may have specific needs, expectations and
requirements for the organization’s information security.
d) Industry associations;
e) Competitors;
f) Customers and consumers;
g) Activist groups.
Implementation Guidance
The following steps should be taken:
— identify external interested parties;
— identify internal interested parties;
— identify requirements of interested parties.
As the needs, expectations and requirement of interested parties change over time, these changes and their
influence on the scope, constraints and requirements of the ISMS should be reviewed regularly.
Documented information on this activity and its outcome is mandatory only within the form and to the extent
the organization determines as necessary for the effectiveness of its management system.
Explanation
ISO/IEC 27001:2013, 4.4 states the central requirement for establishing, implementing, maintaining and
continually improving an ISMS. While the opposite parts of ISO/IEC 27001 describe the specified elements of
an ISMS, 4.4 mandates the organization to make sure that each one required element are met so as to
determine, implement, maintain and continually improve the ISMS.
Explanation
The scope of the information security defines where and for what precisely the ISMS is applicable and where
and for what it’s not. Establishing the scope is therefore a key activity that determines the required foundation
for all other activities within the implementation of the ISMS. as an example, risk assessment and risk
treatment, including the determination of controls, won’t produce valid results without having a particular
understanding of where precisely the ISMS is applicable. Precise knowledge of the boundaries and
applicability of the ISMS and therefore the interfaces and dependencies between the organization and other
Information Security Implementation Guide PAGE 8
Organizations is critical as well. Any later modifications of the scope may result in considerable additional
effort and costs.
The scope of an ISMS is often very different from one implementation to a different. as an example, the scope
can include:
— One or more specific processes;
— One or more specific functions;
— One or more specific services;
— One or more specific sections or locations;
— A whole legal entity;
— A whole administrative entity and one or more of its suppliers.
b) Determine the refined scope: the functional units within and out of doors the preliminary scope should be
reviewed, possibly followed by inclusion or exclusion of a number of these functional units to scale back the
amount of interfaces along the boundaries. When refining the preliminary scope, all support functions should
be considered that are necessary to support the business activities included in the scope;
c) Determine the ultimate scope: the refined scope should be evaluated by all management within the refined
scope. If necessary, it should be adjusted then precisely described; and
d) Approval of the scope: the documented information describing the scope should be formally approved by
top management.
The organization should also consider activities with impact on the ISMS or activities that are outsourced,
either to other parts within the organization or to independent suppliers. For such activities, interfaces
(physical, technical and organizational) and their influence on the scope should be identified.
Required activity
Implementation for Top management demonstrates leadership and commitment with regard to the ISMS.
Implementation Guideline
Leadership and commitment are essential for an efficient ISMS. Top management is defined (see ISO/IEC
27000) as an individual or group of individuals who directs and controls the organization of the ISMS at the
very best level, i.e. top management has the general responsibility for the ISMS. this suggests that top
management directs the ISMS during a similar thanks to other areas within the organization, for instance the
way budgets are allocated and monitored. Top management can delegate authority within the organization
and supply resources for actually performing activities associated with information security and therefore the
ISMS, but it still retains overall responsibility.
As an example, the organization implementing and operating the ISMS are often a business unit within a
bigger organization. during this case, top management is that the person or group of individuals that directs
and controls that business unit. Top management also participates in management review and promotes
continual improvement.
Top management should provide leadership and show commitment through the following:
a) Top management should make sure that the knowledge security policy and therefore the information
security objectives are established and are compatible with the strategic direction of the organization;
b) Top management should make sure that ISMS requirements and controls are integrated into the
organization’s processes. How this is often achieved should be tailored to the precise context of the
organization. for instance, a corporation that has designated process owners can delegate the responsibility to
implement applicable requirements to those persons or group of individuals. Top management support also
can be needed to beat organizational resistance to changes in processes and controls;
c) Top management should make sure the availability of resources for an efficient ISMS. The resources are
needed for the establishment of the ISMS, its implementation, maintenance and improvement, as well as for
implementing information security controls.
The needed resources depend upon the organization’s context, like the dimensions, the complexity, and
internal and external requirements. The management review should provide information that indicates
whether the resources are adequate for the organization;
d) Top management should communicate the necessity for information security management within the
organization and therefore the got to conform to ISMS requirements. this will be done by giving practical
Information Security Implementation Guide PAGE 10
examples that illustrate what the particular need is within the context of the organization and by
communicating information security requirements;
e) Top management should make sure that the ISMS achieves its intended outcome(s) by supporting the
implementation of all information security management processes, and especially through requesting and
reviewing reports on the status and effectiveness of the ISMS . Such reports are often derived from
measurements, management reviews and audit reports. Top management also can set performance
objectives for key personnel involved the ISMS;
f) Top management should direct and support persons within the organization directly involved information
security and therefore the ISMS. Failing to try to this will have a negative impact on the effectiveness of the
ISMS. Feedback from top management can include how planned activities are aligned to the strategic needs
for the organization and also for prioritizing different activities within the ISMS;
g) Top management should assess resource needs during management reviews and set objectives for
continual improvement and for monitoring effectiveness of implementation planned activities;
h) Top management should support persons to whom roles and responsibilities concerning information
security management are assigned, in order that they’re motivated and ready to direct and support
information security activities within their area. In cases where the organization implementing and operating
an ISMS is a component of a bigger organization, leadership and commitment are often improved by
engagement with the person or group of individuals that controls and directs the larger organization. If they
understand what’s involved in implementing an ISMS, they will provide support for top management within
the ISMS scope and help them provide leadership and demonstrate commitment to the ISMS. for instance, if
interested parties outside the scope of the ISMS are engaged in deciding concerning information security
objectives and risk criteria and are kept conscious of information security outcomes produced by the ISMS,
their decisions regarding resource allocations are often aligned to the wants of the ISMS.
Policy
Required activity
ISO 27001 Implementation Guideline Clause 5.2 Policy, Top management establishes an information security
policy.
Explanation
The information security policy describes the strategic importance of the ISMS for the organization and is out
there as documented information. The policy directs information security activities within the organization.
The policy states what the requirements for information security are within the actual context of the
organization.
The information security policy should contain brief, high-level statements of intent and direction concerning
information security. It is often specific to the scope of an ISMS or can have wider coverage. All other policies,
procedures, activities and objectives associated with information security should be aligned to the knowledge
security policy.
The information security policy should reflect the organization’s business situation, culture, issues and
concerns concerning information security. The extent of the knowledge security policy should be in
Information Security Implementation Guide PAGE 11
accordance with the aim and culture of the organization and will seek a balance between simple reading and
completeness. it’s important that users of the policy can identify themselves with the strategic direction of the
policy.
The information security policy can either include information security objectives for the organization or
describe the framework for a way information security objective are set (i.e., who sets them for the ISMS and
the way they ought to be deployed within the scope of the ISMS). for instance, in very large organizations,
high level objectives should be set by the highest management of the whole organization, then, consistent
with a framework established within the information security policy, the objectives should be detailed during
a thanks to provides a sense of direction to all or any interested parties.
The information security policy should contain a transparent statement from the highest management on its
commitment to satisfy information security related requirements. The information security policy should
contain a transparent statement that top management supports continual improvement altogether activities.
it’s important to state this principle within the policy, in order that persons within the scope of the ISMS are
conscious of it.
The information security policy should be communicated to all or any persons within the scope of the ISMS.
Therefore, its format and language should be appropriate in order that it’s easily understandable by all
recipients.
Top management should plan to which interested parties the policy should be communicated. the knowledge
security policy is often written in such how that it’s possible to speak it to relevant external interested parties
outside of the organization. samples of such external interested parties are customers, suppliers, contractors,
subcontractors and regulators. If the knowledge security policy is formed available to external interested
parties, it shouldn’t include tip.
The information security policy may either be a separate standalone policy or included during a
comprehensive policy, which covers multiple management system topics within the organization (e.g. quality,
environment and knowledge security).
The information security policy should be available as documented information. the wants in ISO/IEC 27001
don’t imply any specific form for this documented information, and thus is up to the organization to make a
decision what form is most appropriate. If the organization features a standard template for policies, the
shape of the knowledge security policy should use this template.
Information Security Implementation Guide PAGE 12
Implementation Guideline
Top management ensures that roles and responsibilities also because the necessary authorities relevant to
information security are assigned and communicated. The purpose of this requirement is to assign
responsibilities and authorities to make sure conformance of the ISMS with the wants of ISO/IEC 27001, and
to make sure reporting on the performance of the ISMS to the highest management.
Top management should regularly make sure that the responsibilities and authorities for the ISMS are
assigned in order that the management system fulfils the wants stated in ISO/IEC 27001. Top management
doesn’t get to assign all roles, responsibilities and authorities, but it should adequately delegate authority to
do this. Top management should approve major roles, responsibilities and authorities of the ISMS.
Responsibilities and authorities associated with information security activities should be assigned.
Activities include:
a) Coordinating the establishment, implementation, maintenance, performance reporting, and improvement
of the ISMS;
b) Advising on information security risk assessment and treatment;
c) Designing information security processes and systems;
d) Setting standards concerning determination, configuration and operation of data security controls;
e) Managing information security incidents; and
f) Reviewing and auditing the ISMS.
Beyond the roles specifically associated with information security, relevant information security
responsibilities and authorities should be included within other roles.
For instance, information security responsibilities are often incorporated within the roles of:
a) Information owners;
b) Process owners;
c) Asset owners (e.g., application or infrastructure owners);
d) Risk owners;
e) Information security coordinating functions or persons (this particular role is generally a supporting role
within the ISMS);
f) Project managers;
g) Line managers;
h) Information users.
Information Security Implementation Guide PAGE 13
Resources
Required activity
The organization determines and provides the resources for establishing, implementing, maintaining and
continually improving the ISMS.
Implementation Guideline
Resources are fundamental to perform any quite activity. Categories of resources can include:
a) persons to drive and operate the activities;
b) time to perform activities and time to permit results to calm down before making a replacement step;
c) financial resources to accumulate, develop and implement what’s needed;
d) information to support decisions, measure performance of actions, and improve knowledge; and
e) infrastructure and other means are often acquired or built, like technology, tools and materials, no matter
whether or not they are products of data technology or not.
These resources are to be kept aligned with the requirements of the ISMS and hence are to be adapted when
required.
Documented information on this activity and its outcome is mandatory only within the form and to the extent
the organization determines as necessary for the effectiveness of its management system.
The structure of ISO/IEC 27001 subdivides risks into two categories during planning:
Risks and opportunities relevant to the intended outcome(s) of the ISMS as a whole;
Information security risks that relate to the loss of confidentiality, integrity and availability of data within the
scope of the ISMS.
The first category should be handled in accordance with requirements laid out in ISO/IEC 27001:2013
(general). Risks that fall under this category are often risks concerning the ISMS itself, the ISMS scope
definition, top management’s commitment to information security, resources for operating the ISMS, etc.
Opportunities that fall under this category are often opportunities concerning the outcome(s) of the ISMS, the
commercial value of an ISMS, the efficiency of operating ISMS processes and knowledge security controls, etc.
Information Security Implementation Guide PAGE 14
The second category consists of all risks that directly relate to the loss of confidentiality, integrity and
availability of data within the scope of the ISMS. These risks should be handled in accordance with
(information security risk assessment) and (information security risk treatment). Organizations may prefer to
use different techniques for every category.
The subdivision of requirements for addressing risks are often explained as follows:
It encourages compatibility with other management systems standards for those organizations that have
integrated management systems for various aspects like quality, environment and knowledge security;
It requires that the organization defines and applies complete and detailed processes for information security
risk assessment and treatment;
It emphasizes that information security risk management is that the core element of an ISMS. ISO/IEC
27001:2013 uses the expressions ‘determine the risks and opportunities’ and ‘address these risks and
opportunities. The word “determine” are often considered to be like the word “assess” utilized in ISO/IEC
27001:2013 (i.e. identify, analyze and evaluate). Similarly, the word “address” are often considered like the
word “treat” utilized in ISO/IEC 27001:2013.
When planning for the ISMS, the organization determines the risks and opportunities considering issues
mentioned in understanding the organization and its context and requirements mentioned in understanding
the needs and expectations of interested parties.
Implementation Guideline
For risks and opportunities relevant to the intended outcome(s) of the ISMS, the organization determines
them supported internal and external issues and requirements from interested parties.
Actions should be planned considering integration of data security processes and documentation in existing
structures; of these actions are linked with information security objectives against which the knowledge
security risks are assessed and treated. The general requirement to repeatedly improve the ISMS stated in
ISO/IEC 27001:2013, 10.2 is supported by the need to realize continual improvement given in 6.1.1 with other
relevant requirements of ISO/IEC 27001:2013). The actions required in this often different for strategical,
tactical and operational levels, for various sites, or for various services or systems.
Several approaches are often taken to satisfy the wants of two of which are:
considering risks and opportunities related to planning, implementing and operating the ISMS separately from
information security risks;
considering all risks simultaneously.
An organization that’s integrating an ISMS into a longtime management system can find that the wants of are
met by the organization’s existing business planning methodology. Where this is often the case, care should
be taken to verify that the methodology covers all the wants on the general. Documented information on this
activity and its outcome is mandatory only within the form and to the extent the organization determines as
necessary for the effectiveness of its management system.
Explanation
The organization defines an information security risk assessment process that:
Risk acceptance criteria relates to risk assessment (in its evaluation phase, when the organization should
understand if a risk is suitable or not), and risk treatment activities (when the organization should understand
if the proposed risk treatment is sufficient to succeed in a suitable level of risk). Risk acceptance criteria are
often supported a maximum level of acceptable risks, on cost-benefits considerations, or on consequences for
the organization. The risk acceptance criteria should be approved by the responsible management.
Risk identification is that the process of finding, recognizing and describing risks. This involves the
identification of risk sources, events, their causes and their potential consequences. The aim of risk
identification is to get a comprehensive list of risks supported those events which may create, enhance,
prevent, degrade, accelerate or delay the achievement of data security objectives.
Two approaches are commonly used for the identification of data security risks:
Event-based approach: considers risk sources during a generic way. Events considered can have happened
within the past or are often anticipated for the longer term. within the first case they will involve historical
data, within the second case they will be supported theoretical analysis and expert opinions;
This approach supports identification of assets, threats, and vulnerabilities: considers two differing types of
risk sources: assets with their intrinsic vulnerabilities, and threats. Potential events considered here are ways
on how threats could exploit a particular vulnerability of an asset to impact the organization’s objectives.
Other approaches of risk identification could also be used if they need proven an identical practical usefulness
and if they will make sure the requirements in.
NOTE The approach supported assets, threats, and vulnerabilities corresponds to the knowledge security risk
identification approach by, and compatible with, the wants in ISO/IEC 27001 to make sure that previous
investments in risk identification aren’t lost. It is not recommended that the risk identification be too detailed
within the first cycle of risk assessment. Having a high level but clear picture of the knowledge security risks is
way better than having no picture in the least.
Techniques for risk analysis supported consequences and likelihood can be:
Qualitative, employing a scale of qualifying attributes (e.g., high, medium, low);
quantitative, employing a scale with numerical values (e.g., monetary cost, frequency or probability of
occurrence); or semi-quantitative, using qualitative scales with assigned values.
Whatever technique for risk analysis is employed, its level of objectivity should be considered.
There are several methods for analyzing the risks. the 2 approaches mentioned (event-based approach and
approach supported identification of assets, threats, and vulnerabilities) are often suitable for information
security risk analysis. Risk identification and analysis processes are often best when administered with the
assistance of experts within the relevant risks under discussion.
This final step of the Risk assessment verifies whether the risks that are analyzed within the previous steps are
often accepted consistent with the acceptance criteria defined under or need further treatment. The step in
delivers information about the magnitude of the Risk but no immediate information about the urgency of
implementing risk treatment options. counting on the circumstances during which risks occur, they will have
Information Security Implementation Guide PAGE 18
different priorities for treatment. Therefore, the output of this step should be an inventory of risks in priority
order. it’s useful to retain further information about these risks from the risk identification and risk analysis
steps to support decisions for risk treatment.
Information-security-risk-treatment
Required activity
The organization defines and applies an information security risk treatment process.
Implementation Guideline
Information security risk treatment is that the overall process of choosing risk treatment options, determining
appropriate controls to implement such options, formulating a risk treatment plan and obtaining approval of
the Risk treatment plan by the Risk owner(s). All steps of the knowledge security risk treatment process also
because the results of its application are retained by the organization as documented information.
When determining controls, the organization should also take under consideration controls needed for
services from outside suppliers of e.g., applications, processes and functions. Typically, these controls are
mandated by entering information security requirements within the agreements with these suppliers,
including ways to urge information close to which extent these requirements are met (e.g., right of audit).
There could also be situations where the organization wishes to work out and describe detailed controls as
being a part of its own ISMS albeit the controls are administered by outside suppliers. Independently of the
approach taken, the organization always should consider controls needed at their suppliers when determining
controls for its ISMS.
Comparing controls with those in ISO/IEC 27001:2013,
Annex A ISO/IEC 27001:2013, Annex A contains a comprehensive list of control objectives and controls. Users
of this document are directed to the generic representation of controls in ISO/IEC 27001:2013, Annex A to
make sure that no necessary controls are overlooked. Comparison with ISO/IEC 27001:2013, Annex A also can
identify alternative controls to those determined in which may be simpler at modifying information security
risk. Control objectives are implicitly included within the controls chosen. The control objectives and controls
listed in ISO/IEC 27001:2013, Annex A aren’t exhaustive and extra control objectives and controls should be
added as required.
Not every control within ISO/IEC 27001:2013, Annex A must be included. Any control within ISO/IEC
27001:2013, Annex A that doesn’t contribute to modifying risk should be excluded and justification for the
exclusion should tend.
Justification for including an impact partially relies on the effect of the control in modifying an information
security risk. A regard to information security risk assessment results and therefore the information security
risk treatment plan should be sufficient, alongside the knowledge security risk modification expected by the
implementation of necessary controls.
Justification for excluding an impact contained within ISO/IEC 27001:2013, Annex A can include the following:
It’s been determined that the control isn’t necessary to implement the chosen information security risk
treatment option(s);
The control isn’t applicable because it’s outside the scope of the ISMS (e.g. ISO/IEC 27001:2013,
Outsourced development isn’t applicable if all the organization’s system development is performed in-house)
It’s obviated by a custom control (e.g., in ISO/IEC 27001:2013 management of removable media might be
excluded if a custom control prevents the utilization of removable media).
NOTE A custom control may be a control not included in ISO/IEC 27001:2013, Annex A.
A useful SoA are often produced as a table containing all 114 controls of ISO/IEC 27001:2013, Annex A along
the rows plus rows with the extra controls that aren’t mentioned in ISO/IEC 27001:2013, Annex A, if needed.
One column of the table can indicate whether an impact is important to implement the Risk treatment
option(s) or are often excluded. A next column can contain the justification for inclusion or exclusion of an
impact. a final column of the table can indicate the present implementation status of the control. Further
columns are often used, like for details not required by ISO/IEC 27001 but usually useful for subsequent
reviews; these details are often a more detailed description of how the control is implemented or a cross-
Information Security Implementation Guide PAGE 20
reference to a more detailed description and documented information or policies relevant for implementing
the control.
Although it’s not a selected requirement of ISO/IEC 27001, organizations can find it useful to incorporate
responsibilities for the operation of every control included within the SoA.
A useful information security risk treatment plans are often designed as a table sorted by risks identified
during the Risk assessment, showing all the determined controls. As an example, there are often columns
during this table which indicate the names of the persons liable for providing the controls. Further columns
can indicate the date of implementation of the control, information about how the control (or a process) is
meant to work and a column about the target implementation status.
As an example, for a part of the Risk treatment process, consider the theft of a mobile.
The results are loss of availability and potential undesirable disclosure of data. If the assessment of the Risk
showed that the extent of risk is out of acceptance, the organization can plan to change the likelihood, or
change the results of the Risk. To change the likelihood of loss or theft of a mobile , the organization can
determine that a suitable control is to oblige employees through a mobile device policy to require care of
mobile phones and periodically check for loss.
To change the consequence of loss or theft of a mobile, the organization can determine controls such as:
Comparing these controls with those listed in ISO/IEC 27001:2013, Annex A, it is often seen that the mobile
device policy is aligned with ISO/IEC 27001:2013, A.6.2.1, but the MDM control doesn’t directly align and will
be considered as a further custom control. If MDM and other controls are determined as necessary control(s)
in an organization’s information security risk treatment plan, they ought to be included within the SoA (see
“Guidance on producing an SoA.
Information Security Implementation Guide PAGE 21
If the organization wants to further reduce the Risk, it can consider from ISO/IEC 27001:2013(access control
policy) that it lacked control of access to mobile phones and modify its mobile device policy to mandate the
utilization of PINs on all mobile phones. this could then be an extra control to vary the results of loss or theft
of mobile phones.
When formulating its information security risk treatment plan, the organization should then include actions to
implement mobile device policy and MDM and assign responsibilities and time frames.
As an example, this risk owner’s approvals are often documented by amending the Risk treatment plan
described under guidance on by columns indicating the effectiveness of the control, the residual risk, and
therefore the risk owner’s approval.
Required activity
The organization establishes information security objectives and plans to realize them at relevant functions
and levels.
Implementation Guideline
Information security objectives help to implement strategic goals of a corporation also on implement the
knowledge security policy. Thereby, objectives in an ISMS are the knowledge security objectives for
confidentiality, integrity and availability of data. Information security objectives also help to specify and
measure the performance of data security controls and processes, in accordance with the knowledge security
policy.
The organization plans establishes and issues information security objectives to relevant functions and levels.
Requirements in ISO/IEC 27001 concerning information security objectives apply to all or any information
security objectives. If the knowledge security policy contains objectives, then those objectives are required to
satisfy the standards. If the policy contains a framework for setting objectives, then the objectives produced
by that framework are required to that can be satisfy.
Requirements to be taken under consideration when establishing objectives are those determined when
understanding the organization and its context also because the needs and expectations of interested parties.
The results from risk assessments and risk treatments are used as input to the on-going review of objectives to
make sure that they continue to be appropriate to the circumstances of a corporation Information security
objectives are inputs for risk assessment: risk acceptance criteria and criteria for performing information
security risk assessments take under consideration these security objectives and thus make sure that levels of
risk are aligned with them.
Information Security Implementation Guide PAGE 22
For example, information security objectives are often expressed in terms of:
Numerical values with their limits, e.g., “not re-evaluate a particular limit”, and “reach level 4”;
The targets for measurements of data security performance;
The targets for measurements of the effectiveness of the ISMS;
Compliance with ISO/IEC 27001;
Compliance with ISMS procedures;
The necessity to finish actions and plans;
Risk criteria to be met.
The following guidance applies to the bullets addressed within the explanation:
The knowledge security policy specifies the wants for information security in a corporation. All other specific
requirements set for relevant functions and levels should be according to them. If the knowledge security
policy has information security objectives, then the other specific information security objective should be
linked to those within the information security policy. If the knowledge security policy only provides the
framework for setting objectives, then that framework should be followed and will make sure that more
specific objectives are linked to the more generic ones;
Information Security Implementation Guide PAGE 23
Not every objectives are often measurable, but making objectives measurable supports achievement and
improvement. it’s highly desirable to be ready to describe, qualitatively or quantitatively, the degree to which
an objective has been met. for instance, to guide priorities for extra effort if objectives aren’t met, or to supply
insights into opportunities for improved effectiveness if objectives are exceeded. It should be possible to know
whether or not they are achieved or not, how achievement of objectives is decided, and whether it’s possible
to work out the degree of accomplishment of objectives using quantitative measurements. Quantitative
descriptions of objective attainment should specify how associated measurement is completed. it’s going to
not be possible to quantitatively determine the degree of attainment of all objectives. ISO/IEC 27001 requires
objectives to be measurable if practicable;
Information security objectives should be aligned with information security needs; for this reason, risk
assessment and treatment results should be used as inputs when setting information security objectives;
Information security objectives should be communicated to relevant internal interested parties of the
organization. they’ll even be communicated to external interested parties, e.g. customers, stakeholders, to the
extent they have to understand and are suffering from the knowledge security objectives;
When information security needs change over time, related security objectives should be updated accordingly.
Their update should be communicated as needed in d), to internal and external interested parties as
appropriate.
The organization should plan the way to achieve its information security objectives. The organization may use
any methodology or mechanism it chooses to plan for the achievement of its security objectives. There could
also be one information security plan, one or more project plans, or actions included in other organizational
plans. Whatever form planning takes.
Resources
Required activity
The organization determines and provides the resources for establishing, implementing, maintaining and
continually improving the ISMS.
Implementation Guideline
Resources are fundamental to perform any quite activity. Categories of resources can include:
a) persons to drive and operate the activities;
b) time to perform activities and time to permit results to calm down before making a replacement step;
Information Security Implementation Guide PAGE 24
Documented information on this activity and its outcome is mandatory only within the form and to the extent
the organization determines as necessary for the effectiveness of its management system.
Competence
Required activity
ISO 27001 Implementation Guideline for Clause 7.2, Clause 7.3 & Clause 7.4, The organization determines the
competence of persons needed for information security performance and ensures that the persons are
competent.
Implementation Guidance
Competence is that the ability to use knowledge and skills to realize intended results. it’s influenced by
knowledge, experience and wisdom. Competence are often specific (e.g. about technology or specific
management areas like risk management) or general (e.g. soft skills, trustworthiness, and basic technological
and managerial subjects).
Competence relates to persons that employment in check of the organization. this suggests that competence
should be managed for persons that are employees of the organization and for people as required. Acquisition
of upper or new competence and skills are often achieved both internally and externally through experience,
training (e.g. courses, seminars and workshops), mentoring, hiring or contracting external persons.
For competence that’s only temporarily needed – for a selected activity or for a brief period of your time, e.g.
to hide unexpected temporary shortage of internal personnel – organizations can hire or contract external
resources, whose competence is to be described and verified.
identifying persons within the organization who have the competence (based e.g. on their education,
experience, or certifications);
Information Security Implementation Guide PAGE 25
planning and implementing actions to possess persons within the organization obtain the competence (e.g.
through provision of coaching, mentoring, reassignment of current employees);
engaging new persons who have the competence (e.g. through hiring or contracting);
Evaluate the effectiveness of actions
Awareness
Required activity
The persons doing work under the organization’s control are made conscious of the knowledge security policy,
their contribution to the effectiveness of the ISMS, benefits of improved information security performance
and implications of not conforming to the wants of the ISMS.
Implementation Guidance
Awareness of persons working under the organization’s control refers to having the required understanding
and motivation about what’s expected of them with reference to information security.
These persons got to remember that an information security policy exists and where to seek out information
about it. Many staff in a corporation don’t got to know the detailed content of the policy. Instead, they ought
to know, understand, accept and implement the knowledge security objectives and requirements derived
from the policy that affect their job role. These requirements are often included in the standards or
procedures they’re expected to follow to try to their job.
Prepare a program with the precise messages focused on each audience (e.g. internal and external persons);
Include information security needs and expectations within awareness and training materials on other topics
to put information security needs into relevant operational contexts;
Information Security Implementation Guide PAGE 26
Communication
Required activity
The organization determines the requirements for internal and external communications associated with the
ISMS.
Implementation Guidance
Communication may be a key process within an ISMS. Adequate communication is important with internal and
external interested parties. Communications are often between internal interested parties in the least levels
of the organization or between the organization and external interested parties. Communication are often
initiated within the organization or by an external interested party.
Which content must be communicated, e.g. information security policies, objectives, procedures, their
changes, knowledge on information security risks, requirements to suppliers and feedback on the knowledge
security performance;
The well-liked or optimal point in time for communication activities;
Who is to be involved in communication activities, and which is that the audience of every communication
effort;
Who is to initiate communication activities, e.g. specific content can require communication to be initiated by
a selected person or organization;
Which processes are driving or initiating communication activities, and which processes are targeted or
suffering from communication activities.
Communication can happen regularly or as needs arise. It are often either proactive or reactive.
Communication relies on processes, channels and protocols. These should be chosen to make sure the
communicated message is integrally received, correctly understood and, when relevant, acted upon
appropriately.
Plans and results of risk management to interested parties as required and appropriate, within the
identification, analysis, evaluation, and treatment of the risks;
Information security objectives;
Achieved information security objectives including people who can support their position within the market
(e.g., ISO/IEC 27001 certificate granted; claiming conformance with personal data protection laws);
Incidents or crises, where transparency is usually key to preserve and increase trust and confidence within the
organization’s capability to manage its information security and affect unexpected situations;
Information Security Implementation Guide PAGE 27
Who is allowed to speak externally and internally (e.g. in special cases like a knowledge breach), allocating to
specific roles with the acceptable authority. for instance, official communication officers are often defined
with the acceptable authority. they might be a PR officer for external communication and a security officer for
internal communication;
The triggers or frequency of communication (e.g., for communication of an occasion, the trigger is that the
identification of the event);
The contents of messages for key interested parties (e.g. customers, regulators, general public, important
internal users) supported high level impact scenarios. Communication are often simpler if supported messages
prepared and pre-approved by an appropriate level of management as a part of a communication plan, the
incident response plan or the business continuity plan;
The intended recipients of the communication; in some cases, an inventory should be maintained (e.g. for
communicating changes to services or crisis);
The communication means and channels. Communication should use dedicated means and channels, to form
sure that the message is official and bears the acceptable authority. Communication channels should address
any needs for the protection of the confidentiality and integrity of the knowledge transmitted; and
The designed process and therefore the method to make sure messages are sent and are correctly received
and understood.
Communication should be classified and handled consistent with the organization’s requirements.
Documented information on this activity and its outcome is mandatory only within the form and to the extent
the organization determines as necessary for the effectiveness of its management system (see ISO/IEC
27001:2013).
Implementation Guideline
Documented information is required to define and communicate information security objectives, policy,
guidelines, instructions, controls, processes, procedures, and what persons or groups of individuals are
expected to try to do and the way they’re expected to behave. Documented information is additionally
needed for audits of the ISMS and to take care of a stable ISMS when persons in key roles change. Further,
documented information is required for recording actions, decisions and outcome(s) of ISMS processes and
knowledge security controls.
Information Security Implementation Guide PAGE 28
The organization should determine what documented information is important for ensuring effectiveness of
its ISMS additionally to mandatory documented information required by ISO/IEC 27001.The documented
information should be there to suit the aim. Factual and ‘to the point’ information is what’s needed.
Examples of documented information which will be determined by the organization to be necessary for
ensuring effectiveness of its ISMS are:
Implementation Guideline
The organization identifies intimately how the documented information is best structured and defines an
appropriate documentation approach. Review and approval by appropriate management ensures that the
documented information is correct, suitable for the aim, and in an adequate form and detail for the intended
audience. Regular reviews ensure continued suitability and adequacy of documented information.
Documented information could also be retained in any form, e.g. traditional documents (in both paper and
electronic form), web pages, databases, computer logs, computer generated reports, audio and video.
Moreover, documented information may contain specifications of intent (e.g. the knowledge security policy)
or records of performance (e.g. the results of an audit) or a mix of both. the subsequent guidance applies on
to traditional documents and will be interpreted appropriately when applied to other sorts of documented
information.
Organizations should create a structured documented information library, linking different parts of
documented information by:
Organizations should define a documentation approach that has common attributes of each document, which
permit clear and unique identification. These attributes usually include document type (e.g. policy, directive,
rule, guideline, plan, form, process or procedure), the aim and scope, title, date of publication, classification,
reference number, version number, and a revision history. The identification of the author and therefore the
person(s) currently liable for the document, its application and evolution, also because the approver(s) or
approval authority should be included.
Format requirements can include definition of suitable documentation languages, file formats, software
version for working with them and graphical content. Media requirements define on which physical and
electronic media the knowledge should be available. Statements and literary genre should be tailored to the
audience and scope of the documentation.
Duplication of data in documented information should be avoided and cross-references used instead of
replicating an equivalent information in several documents. The documentation approach should ensure
timely review of the documented information which all documentation changes are subject to approval.
Suitable review criteria are often timing related (e.g. maximum time periods between document reviews) or
Information Security Implementation Guide PAGE 30
content related. Approval criteria should be defined, which ensures that the documented information is
correct, suitable for the aim, and in an adequate form and detail for the intended audience.
Implementation Guideline
Once approved, the documented information is communicated to its intended audience. Documented
information is out there where and when it’s needed, while preserving its integrity, confidentiality, and
relevance throughout the entire lifecycle. Note that activities described “as applicable” in ISO/IEC 27001:2013
got to be performed if they will be performed and are useful, considering the organization’s needs and
expectations.
A structured documented information library are often wont to facilitate access to documented information.
All of the documented information should be classified (see ISO/IEC 27001:2013) in accordance with the
organization’s classification scheme. Documented information should be protected and handled in accordance
with its classification level (see ISO/IEC 27001:2013).
A change management process for documented information should make sure that only authorized persons
have the proper to vary and distribute it as required through appropriate and predefined means.
Documented information should be protected to make sure it keeps its validity and authenticity. Documented
information should be distributed and made available to authorized interested parties. For this, the
organization should establish who are the relevant interested parties for every documented information (or
groups of documented information), and therefore the means to use for distribution, access, retrieval and use
(e.g. an internet site with appropriate access control mechanisms). The distribution should suit any
requirements associated with protecting and handling of classified information.
The organization should establish the acceptable retention period for documented information consistent
with its intended validity and other relevant requirements. The organization should make sure that
information is legible throughout its retention period (e.g. using formats which will be read by available
software or verifying that paper isn’t corrupted).
The organization should establish what to try to do with documented information after its retention period
has expired. The organization should also manage documented information of external origin (i.e. from
customers, partners, suppliers, regulatory bodies, etc.).
Documented information on this activity and its outcome is mandatory only within the form and to the extent
the organization determines as necessary for the effectiveness of its management system (see ISO/IEC
27001:2013).
Information Security Implementation Guide PAGE 31
The organization plans, implements and controls the processes to satisfy its information security requirements
and to realize its information security objectives. The organization keeps documented information as
necessary to possess confidence that processes are administered as planned. The organization controls
planned changes and reviews the results of unintended changes, and ensures that outsourced processes are
identified, defined and controlled.
Implementation Guideline
The processes that a corporation uses to satisfy its information security requirements are planned, and once
implemented, they’re controlled, particularly when changes are required. Building on the design of the ISMS,
the organization performs the required operational planning and activities to implement the processes
needed to fulfil the knowledge security requirements.
The organization ultimately remains liable for planning and controlling any outsourced processes so as to
realize its information security objectives. Thus, the organization needs to:
Determine outsourced processes considering the knowledge security risks associated with the outsourcing;
Make sure that outsourced processes are controlled (i.e. planned, monitored and reviewed) during a manner
that gives assurance that they operate as intended (also considering information security objectives and
therefore the information security risk treatment plan).
After the implementation is completed, the processes are managed, monitored and reviewed to make sure
that they still fulfil the wants determined after understanding the requirements and expectations of interested
parties. Changes of the ISMS operational are often either planned or they occur unintended. Whenever the
organization makes changes to the ISMS (as a result of planning or unintentionally), it assesses the potential
consequences of the changes to regulate any adverse effects.
The organization can get confidence about the effectiveness of the implementation of plans by documenting
activities and using documented information as input to the performance evaluation processes laid out in
Clause 9. The organization therefore establishes the specified documented information to stay.
Information Security Implementation Guide PAGE 32
The processes that are defined as a result of the design described in Clause 6 should be implemented,
operated and verified throughout the organization. the subsequent should be considered and implemented:
Processes that are specific for the management of data security (such as risk management, incident
management, continuity management, internal audits, management reviews);
Processes emanating from information security controls within the information security risk treatment plan;
Reporting structures (contents, frequency, format, responsibilities, etc.) within the knowledge security area,
for instance incident reports, reports on measuring the fulfillment of data security objectives, reports on
performed activities;
Meeting structures (frequency, participants, purpose and authorization) within the knowledge security area.
Information security activities should be coordinated by representatives from different parts of the
organization with relevant roles and job functions for effective management of the knowledge security area.
Plan their implementation and assign tasks, responsibilities, deadlines and resources;
Implement changes consistent with the plan;
Monitor their implementation to verify that they’re implemented consistent with the plan;
Collect and retain documented information on the execution of the changes as evidence that they need been
administered as planned (e.g. with responsibilities, deadlines, effectiveness evaluations).
If a part of the organization’s functions or processes are outsourced to suppliers, the organization should:
The organization performs information security risk assessments and retains documented information on their
results.
Implementation Guideline
When performing information security risk assessments, the organization executes the method defined. These
assessments are either executed consistent with a schedule defined beforehand, or in response to significant
changes or information security incidents. The results of the knowledge security risk assessments are retained
in documented information as evidence that the method in 6.1.2 has been performed as defined.
Documented information from information security risk assessments is important for information security risk
treatment and is effective for performance evaluation.
Organizations should have an idea for conducting scheduled information security risk assessments. When any
significant changes of the ISMS (or its context) or information security incidents have occurred, the
organization should determine:
Which of those changes or incidents require a further information security risk assessment;
How these assessments are triggered.
The level of detail of the risk identification should be refined step by step in further iterations of the
knowledge security risk assessment within the context of the continual improvement of the ISMS. A broad
information security risk assessment should be performed a minimum of once a year.
The organization implements the knowledge security risk treatment plan and retains documented information
on the results of the knowledge security treatment.
Implementation Guideline
In order to treat information security risks, the organization must perform the knowledge security risk
treatment process defined in 6.1.3. During operation of the ISMS, whenever the risk assessment is updated
consistent with 8.2, the organization then applies the risk treatment consistent with 6.1.3 and updates the risk
treatment plan. The updated risk treatment plan is again implemented. The results of the knowledge security
risk treatment are retained in documented information as evidence that the method in 6.1.3 has been
performed as defined.
Information Security Implementation Guide PAGE 34
The information security risk treatment process should be performed after each iteration of the knowledge
security assessment process in 8.2 or when the implementation of the risk treatment plan or parts of it fails.
The progress of implementation of the knowledge security risk treatment plan should be driven and
monitored by this activity.
Implementation Guideline
The objective of monitoring and measurement is to assist the organization to gauge whether the intended
outcome of data security activities including risk assessment and treatment is achieved as planned. Monitoring
determines the status of a system, a process or an activity, whilst measurement may be a process to work out
a worth. Thus, monitoring is often achieved through a succession of comparable measurements over a while
period.
A good practice is to define the ‘information need’ when planning the monitoring, measurement, analysis and
evaluation. An information need is typically expressed as a high-level information security question or
statement that helps the organization evaluate information security performance and ISMS effectiveness. In
other words, monitoring and measurement should be undertaken to realize an outlined information need.
Care should be taken when determining the attributes to be measured. it’s impracticable, costly and
counterproductive to live too many, or the incorrect attributes. Besides the prices of measuring, analyzing and
evaluating numerous attributes, there’s an opportunity that key issues might be obscured or missed
altogether.
Information Security Implementation Guide PAGE 35
It is often appropriate to spot and assign distinctive roles to those participating within the monitoring,
measurement, analysis and evaluation. Those roles are often measurement client, measurement planner,
measurement reviewer, information owner, information collector, information analyst and knowledge
communicator of input or output of evaluation.
The responsibilities for monitoring and measurement and people for analysis and evaluation are often
assigned to separate persons whom different competence is required.
Monitoring, measurement, analysis and evaluation is critical to the success of an efficient ISMS. There are
variety of clauses in ISO/IEC 27001 that explicitly require determination of the effectiveness of some activities.
for instance, ISO/IEC 27001:2013). Further information are often found in ISO/IEC 27004, which provides
guidance on meeting the wants of ISO/IEC 27001:2013, especially, it expands on all of the concepts mentioned
above, like roles and responsibilities, and forms, and provides numerous examples.
Internal audit
Activity
ISO 27001 Clause 9.2 Internal audit, the organization conducts internal audits to supply information on
conformity of the ISMS to the wants.
Implementation Guideline
Evaluating an ISMS at planned intervals by means of internal audits provides assurance of the status of the
ISMS to top management. Auditing is characterized by variety of principles: integrity; fair presentation; due
professional care; confidentiality; independence; and evidence-based approach (see ISO 19011). Internal
audits provide information on whether the ISMS conform to the organization’s own requirements for its ISMS
also on the wants in ISO/IEC 27001.
managed consistent with requirements. Risks and opportunities are managed consistent with requirements.
The organization is required to retain documented information about audit program and audit results.
The extent and frequency of internal audits should be supported the dimensions and nature of the
organization also as on the character, functionality, complexity and therefore the level of maturity of the ISMS
(risk-based auditing). The effectiveness of the implemented controls should be examined within the scope of
internal audits.
An audit program should be designed to make sure coverage of all necessary controls and will include
evaluation of the effectiveness of selected controls over time. Key controls (according to the audit program)
should be included in every audit whereas controls implemented to manage lower risks could also be audited
less frequently. The audit program should also consider that processes and controls should are operational for
a few time to enable evaluation of suitable evidence.
Internal audits concerning an ISMS are often performed effectively as a neighborhood of, or together with,
other internal audits of the organization. The audit program can include audits associated with one or more
management system standards, conducted either separately or together. An audit program should include
documented information about: audit criteria, audit methods, selection of audit teams, processes for handling
confidentiality, information security, health and safety provisions for auditors, and other similar matters.
Organizations should consider that internal employees acting as internal auditors are often ready to perform
detailed audits considering the organization’s context, but might not have enough knowledge about
Information Security Implementation Guide PAGE 37
performing audits. Organizations should then recognize characteristics and potential shortcomings of internal
versus external auditors and establish suitable audit teams with the required knowledge and competence.
If the result of the audit includes nonconformities, the audit should prepare an action plan for every
nonconformity to be agreed with the audit team leader.
Other information
Further information are often found in ISO 19011, which provides general guidance on auditing management
systems, including the principles of auditing, managing an audit program and conducting management system
audits. It also provides guidance on the evaluation of competence of persons or group of individuals involved
within the audit, including the person managing the audit program, auditors and audit teams.
Also, additionally to the guidance contained in ISO 19011, further information are often found in:
Information Security Implementation Guide PAGE 38
a) (ISO/IEC 270071), which provides specific guidance on managing an ISMS audit program, on conducting the
audits, and on the competence of ISMS auditors; and
b) (ISO/IEC 270081), which provides guidance on assessing information security controls.
Management review
Activity
Top Management conducts management review for ISO 27001 at planned intervals.
Management review, clause highlights the significance of management review which helps to ensure
continuing suitability, adequacy, and effectiveness of Information Security Management System in the
organization, where Suitability refers to the continuous alignment with the objectives of the organization,
Adequacy and Effectiveness call for appropriate design and organizational embedding respectively. It is a
process which is administered at various levels of the organization where the activities could range from daily,
weekly or monthly organization unit meeting to simple reporting discussions. It is the responsibility of the top
management to evaluate this review with contributions from all the levels of the organization. Management
Review generally happens after the ISMS internal audit is completed, and it occurs at planned intervals and in
a strategic manner.
All aspects of the ISMS should be reviewed by management at planned intervals, a minimum of yearly, by
fixing suitable schedules and agenda items in management meetings. Also, recently implemented ISMS should
be reviewed frequently by management to increase overall effectiveness.
Opportunities for continual improvement, including efficiency improvements for both the ISMS and
information security controls.
The input for the management review should be at an acceptable level of detail, consistent with the objectives
set for the organization. For example, just a description of all things, aligned with information security
objectives or high-level objectives, will be reviewed by top management.
The end result of this management review process will include continuous improvement of ISMS and will also
address any changes if required in ISMS. End results may also include evidence of selections regarding-
“Information is an asset, a building block and the key to growth for any organization. To ensure business keeps
ahead of the competition, it is essential to safeguard business critical information from threats of data hacking
and data loss.
Explanation
Nonconformity may be a non-fulfilment of a requirement of the ISMS. Nonconformity cannot always be
avoided, because mistakes do happen in an organization; however, what is important is that the issue is
identified and handled accordingly when it presents itself. Requirements are needs or expectations that are
stated, implied or obligatory. There are several types of nonconformities such as:
Failure to fulfil a requirement (completely or partially) of ISO/IEC 27001 within the ISMS;
Failure to properly implement or conform to a requirement, rule or control stated by the ISMS;
Partial or total failure to suits legal, contractual or agreed customer requirements.
Nonconformities are often for example:
Persons not behaving needless to say by procedures and policies;
Suppliers not providing agreed products or services;
Projects not delivering expected outcomes; and
controls not operating consistent with design.
Nonconformities are often recognized by:
Deficiencies of activities performed within the scope of the management system;
Ineffective controls that aren’t remediated appropriately;
Information Security Implementation Guide PAGE 40
Analysis of data security incidents, showing the non-fulfilment of a requirement of the ISMS;
Complaints from customers;
Alerts from users or suppliers;
Monitoring and measurement results not meeting acceptance criteria; and
Objectives not achieved.
Communicating with relevant personnel to make sure that corrections are carried out.
Completing corrections as decided;
Monitoring things to make sure that corrections have had the intended effect and haven’t produced
unintended side-effects;
Acting further to correct the nonconformity if it’s still not remediated; and
Communicating with other relevant interested parties, as appropriate.
However, corrections alone won’t necessarily prevent recurrence of the nonconformity. Corrective actions can
occur after, or in parallel with, corrections. the subsequent process steps should be taken:
The organization needs to decide if there’s a requirement to hold out a corrective action, in accordance with
established criteria (e.g., impact of the nonconformity, repetitiveness);
Review of the nonconformity, considering:
– If similar nonconformities are recorded;
– All the results and side-effects caused by the nonconformity;
– The corrections taken.
Perform an in-depth root cause analysis of the nonconformity.
Patterns and criteria which will help to spot similar situations within the future.
Perform an analysis of potential consequences on the ISMS, considering:
– whether similar nonconformities exist in other areas, e.g., by using the patterns and criteria found during the
cause analysis;
– whether other areas match the identified patterns or criteria, in order that it’s only a matter of your time
before an identical nonconformity occurs.
Determine actions needed to correct the cause, evaluating if they’re proportionate to the results and impact
of the nonconformity, and checking for any potential side-effects which can cause other nonconformities or
significant new information security risks.
To plan for the corrective actions, giving priority, if possible, to areas where there are higher likelihood of
recurrence and more significant consequences of the nonconformity.
Implement the corrective actions consistent with the plan.
Information Security Implementation Guide PAGE 41
Finally, to assess the corrective actions to work out whether or not they have actually handled the explanation
for the nonconformity, and whether it has prevented nonconformities from occurring. This assessment should
be impartial, evidence-based and documented. It should even be communicated to the acceptable roles and
stakeholders.
Also Read: ISO 27001 Clause 10.2 Continual Improvement
As a result of corrections and corrective actions, it is possible that new opportunities for improvement are
identified. These should be treated accordingly. Sufficient documented information is required to be retained
to demonstrate that the organization has acted appropriately to deal with the nonconformity and has
addressed the related consequences.
All significant steps of nonconformity management (starting from discovery and corrections) and, if started,
corrective action management (cause analysis, review, decision about the implementation of actions, review
and alter decisions made for the ISMS itself) should be documented. The documented information is
additionally required to incorporate evidence on whether or not actions taken have achieved the intended
effects.
Some organizations maintain registers for tracking nonconformities and corrective actions. There is often one
register (for example, one for every functional area or process) and on different media (paper, file, application,
etc.). If this is often the case, then they ought to be established and controlled as documented information
and that they should allow a comprehensive review of all nonconformities and corrective actions for ensuring
the right evaluation of the necessity for actions.
Thus, stakeholders need to realize that the event of a nonconformity itself within an organization is not the
end of the world, but it will have more dire consequences if the nonconformity is not properly identified,
addressed, corrected, and prevented in the future.
Continual Improvement
Required Activity
ISO 27001 Clause 10.2 Continual Improvement, the organization continually improves the suitability, adequacy
and effectiveness of the ISMS.
Organizations are never static, nor their contexts. In addition, the threats to the information systems, and the
ways in which they can be compromised, are rapidly changing. At the end of the day, there’s no ISMS which
remains perfect; it always needs to be set on continual improvement; however, the organization and its
context are not changing.
Area of improvements
Regular internal audits
Regular and proper management review (Clause 9.3 ISO 27001)
Information Security Implementation Guide PAGE 42
Suitability of the ISMS, considering the external and internal issues, requirements of the interested parties,
established information security objectives and identified information security risks are properly addressed
through planning and implementation of the ISMS and information security controls.
ISMS adequacy to find the conformity of ISMS processes and information security meets the ultimate goals,
practices and processes of the company.
Effectiveness of the ISMS, considering if the intended outcome(s) of the ISMS are achieved, the wants of the
interested parties are met, information security risks are managed to satisfy information security objectives,
nonconformities are managed, while resources needed for the establishment, implementation, maintenance
and continual improvement of the ISMS are commensurate with those results.
The assessment can also include an overview of the efficiency of the ISMS and the components of its
resources, evaluating whether their usage of resources is appropriate, if there is a possibility of productivity
loss or opportunity to achieve greater effectiveness. Area of improvement can also be identified while
managing nonconformities with corrective actions.
Once area(s) of improvement are identified, the organization should be consistent in maintaining them by:-
INDEX
ISO 27001 Annex A Controls
1 Information Security Policies
2 Organization of Information Security
3 Mobile Devices and Teleworking
4 Human Resource Security
5 During Employment
6 Termination and Change of Employment
7 Asset Management
8 Acceptable Use of Assets & A Return of Assets
9 Information Classification
10 Labelling of Information & A Handling of Assets
11 Media Handling
12 Access Control
13 Access to Networks and Network Services
14 User Access Management
15 Management of Privileged Access Rights
16 Management of Secret Authentication Information of Users
17 Review of User Access Rights
18 Removal or Adjustment of Access Rights
19 User Responsibilities
20 System and Application Access Control
21 Use of Privileged Utility Programs
22 Access Control to Program Source Code
23 Cryptography
24 Physical and Environmental Security
25 Equipment
26 Securing Offices, Rooms and Facilities
27 Protecting Against External and Environmental Threats
28 Working in Secure Areas
29 Delivery and Loading Areas
30 Equipment Maintenance
31 Removal of Assets
32 Security of Kit and Assets Off-Premises
33 Secure Disposal or Re-use of Equipment
34 Unattended User Equipment
35 Clear Desk and Clear Screen Policy
36 Operations Security
37 Protection from Malware
38 Backup
39 Logging and Monitoring
Information Security Implementation Guide PAGE 44
Internal Organization
ISO 27001 Annex: A.6 Organization of Information Security its object is to establish a management framework
for initiating and controlling the implementation and functioning of information security within the
organization.
Areas for which individuals are responsible should be defined. In fact, the subsequent should take place:
1. Assets as well as the information security processes should be identified and well defined;
2. An individual candidate should be assigned for each asset and information security processes and details
describing the responsibility should be documented;
3. Levels of authorization should be described and documented;
4. The appointed persons should be competent in this area and be given opportunities to keep up to date with
their progress, in order to meet responsibilities in the information security area;
5. Coordination and monitoring should be identified and documented on information security aspects of
supplier relations.
Other Information- Many organizations assign an information security officer to take ultimate responsibility
for information security development and implementation, and to help access recognition. However,
individual management will often remain responsible for the resourcing and implementation of the controls. It
is common practice to appoint an owner for all assets which are then responsible for their regular security.
Control- Conflicting tasks and areas of responsibility should be separated to reduce opportunities to change or
misuse the assets of the organization without permission or unintended.
Implementation Guidance- No one shall be allowed without authorization or approval to access, modify or
use the assets. This will distinguish the execution of an occurrence from its authorization. The probability of
collusion in should be considered while designing the controls. Small organizations may find it impossible to
accomplish division of tasks, but the principle should be enforced as far as is practicable and feasible. If
segregation is challenging, other measures such as task reporting, audit trails and management supervision
should be considered.
Other Information- Segregation of duties may be a method to reduce the risk of unintentional or intentional
abuse of the assets of the organization.
Implementation Guidance- Organizations should have processes in place that determine when and by whom
officials (e.g. law enforcement, regulatory agencies, supervisory officials) should communicate and how
information security violations detected will be recorded in a timely manner (e.g. if the law is alleged to have
been violated).
Other Information- Internet-assaulted organizations may require authorities to take measures against the
attack. Holding these connections may also be a necessity to support incident management or business
continuity and contingency planning processes in information security. Contacts with regulatory bodies are
also useful when anticipating and preparing potential changes in the laws or regulations that the organization
needs to enforce. Contacts with other authorities include utilities, emergency services, suppliers of energy and
safety, and protection such as fire departments, telecommunication (routing and availability) suppliers, and
water (equipment cooling).
Implementation Guidance
Implementation Guidance- Information security should be incorporated with the project management
method(s) of the organization to ensure the identification and response to threats in information security as
part of a project. This is commonly applicable to any project irrespective of its purpose, e.g., a core business
process project, IT, facilities management, and other supporting processes.
Implementation Guidance- Special care should be taken when using mobile devices to ensure that business
information is not compromised. The policy on mobile devices should take into account the risks of working
with mobile devices in unprotected environments.
Mobile devices should also be physically secured against theft, particularly when entering, for example, in
vehicles and other modes of transport, hotel rooms, convention centers, and public gatherings. A chosen
protocol, taking into account the regulatory, insurance, and other security requirements of the organization,
should be defined for cases of theft or loss of mobile devices. Devices containing confidential, sensitive, or
crucial business information should not be ignored and, if possible, should be physically locked away, or
special locks should be used to protect the items.
Training should be provided for workers using mobile devices to increase their understanding of the potential
risks emerging from this method of operating and, thereby, the controls that should be implemented. If the
mobile device policy allows the use of private mobile devices, it will also include the rules and associated
security controls, those are: -
Separate personal and business usage of the devices, including by using software to help the segregation of
personal devices and protect business data;
Providing access to business information only after an end-user agreement has been signed that recognizes
their duties (physical safeguard, software upgrade, etc.) waives control of the company’s business data and
requires remote data wiping by the client for burglary, loss of a device, or no longer authorized to use a
service. The Privacy Legislation must be taken into account in this strategy.
Other Information- Wireless networks for mobile devices are similar to other network connections but have
significant variations to be taken into account in the detection of controls. Those significant variations are as
follows: -
Certain wireless security protocols are immature and have defined weaknesses;
Mobile device storage may not be backed up due to insufficient network bandwidth and even when backup
processing is scheduled, devices may not be connected.
Mobile devices generally share common functions, e.g. networking, internet access, e-mail, and file handling,
with fixed-use devices. Controls in information security for mobile devices typically consist of those
implemented within fixed use systems and those to counter risks raised by their use outside the premises of
the organization.
A.6.2.2 Teleworking
Control- To guard the accessed, processed, or stored information at teleworking sites, a policy and supporting
security measures should be implemented.
Implementation Guidance- Teleworking organizations should issue a policy defining the guidelines for using
teleworking. The following points should be considered where deemed applicable and authorized by law: -
The existing physical security of the teleworking site, taking into account the physical safety of the building
and, consequently, the local environment;
the proposed physical teleworking environment;
Communications security requirements, taking into consideration the need for direct access to the internal
networks of the organization, the sensitivity of the information to be obtained and transmitted via the contact
channel and, thus, the vulnerability of the internal system;
Providing virtual desktop access which prevents information processing and storing on private equipment;
Information Security Implementation Guide PAGE 49
Risk of unauthorized access to information or resources from other persons using the amenities, e.g. family
and friends.
Usage of home networks, and requirements or limitations on wireless network access configuration;
Policies and procedures for settling conflicts involving property rights built on privately-owned equipment;
Access to private facilities (to test the security of the device or during an investigation) which may be
prohibited by law;
Software License agreements which are such organizations may be responsible on workstations owned
privately by staff and/or external parties for licensing for client software;
Requirements for malware protection and firewall.
The procurement of suitable teleworking facilities and storage furniture, where the use of private devices not
under the organization’s regulation is not permitted;
A definition of the work allowed, the hours of work, the classification of the information to be stored and
therefore the internal systems and services to which the teleworker is entitled;
Provision of an appropriate communication system, including methods for securing remote access;
Physical security, provision of insurance policies, a requirement of support and maintenance for hardware and
software
Rules and guidance on access to equipment and information for families and visitors;
Monitoring of audit and security,
Backup and business continuity planning
Revocation of authority and service privileges and removal of facilities after termination of teleworking
operations.
Other Information- Telecommunications applies to all working practices, particularly non-traditional work
environments, such as those known as ‘telecom,’ ‘flexible workplace,’ ‘virtual work’ or ‘remote work.’
Communication plays a vital role in personal life as well as in Business operations, standards like ISO 27001
and its sister standard ISO 27002 which provides the guidelines on usages of mobile devices and teleworking,
Prior to Employment
ISO 27001 Annex: A.7 Human Resource Security Its object is to make sure both employees and vendors
recognize their duties and are suitable for their positions.
A.7.1.1 Screening
Control- Background verification checks on all job applicants will be performed in compliance with applicable
rules, legislation, and ethics and should be proportionate to business criteria, classification of the information
to be obtained, and potential risks.
Implementation Guidance- All applicable privacy, personal identity information security, and employment-
based policies, should be taken into consideration and should include the following:
Information Security Implementation Guide PAGE 50
Availability of appropriate references to character, e.g., one business and one personal;
A verification of the applicant’s curriculum vitae (for completeness and correctness);
Verification of asserted professional and academic qualifications;
Independent biometric identification (passport or similar document);
Further thorough checking; such as credit verification or criminal record verification.
If recruiting a private individual for a designated security position, organizations should ensure the following
points: -
Procedures should identify requirements and limitations for verification reviews, such as who is eligible for
screening, and how, where, and why verification reviews are performed.
A process of screening for contractors should also be guaranteed. In these situations, the agreement between
the company and thus the contractor will specify the requirements for the screening and notification
protocols to be followed if the screening has not been completed or if the results give rise to doubts or
concerns.
Information on all applicants eligible for positions within the company will be obtained and processed in
compliance with the applicable regulations in the relevant jurisdiction. Taking into account the law in place,
candidates will be notified in advance of the screening activities.
This is where Human Resources plays a crucial role in the organization, beginning with having the right
selection, making them aware of their roles and responsibilities, and in addition, the role of HR comes with
great responsibility and security for the organization.
Implementation Guidance- The contractual responsibilities of employees or contractors should represent the
information security policies of the company in addition to clarifying and stating the following points:-
That and employee and contractor who has access to sensitive information will sign a confidentiality or non-
disclosure agreement before access to information processing facilities is granted;
Legal responsibilities and rights of the employee or contractor, e.g. copyright or data protection legislation;
Responsibilities for classifying information and handling organizational assets related to information,
information processing and information services managed by the employee or contractor;
Information Security Implementation Guide PAGE 51
Employee or contractor’s responsibilities in the handling of information received from other companies or
from outside parties;
Actions to be taken where the employee or contractor fails to comply with the security requirements of the
organization.
Roles and responsibilities in information security should be communicated to job applicants during the pre-
employment process.
The organization should see to it that the terms and conditions of information security are agreed by the
employees and the contractor as appropriate for the nature and scope of their access to information systems
and services assets of the organization.
Responsibilities under the terms and conditions of employment should, where appropriate, continue for a
defined period after the termination of employment.
Other Information- The Code of Conduct can be used to set out the information responsibilities of the
employee or contractor with respect to confidentiality, data security, ethics, proper use of the organization’s
equipment and facilities, as well as the responsible practices required by the organization. An external party to
which the contractor is associated may be expected to enter into contractual agreements on behalf of the
contracted person.
During Employment
ISO 27001 Annex: A.7.2 During Employment Its objective is to make sure that employees and contractors are
conscious of and fulfill their information security responsibilities.
Implementation Guidance- Responsibilities for management should include ensuring employees and
contractors are:
Are adequately briefed about information security role and responsibilities before given access to confidential
information or information systems;
Shall provide proper guidelines stating the information security expectations from their roles in the
organization.
Motivated to comply with the organization’s information security policies;
Achieving the level of information security awareness relevant to their organizational positions and
responsibilities;
comply with the terms and conditions of employment, including the information security policy of the
organization and the relevant working methods;
Seek to have relevant qualifications and expertise, and are regularly trained;
An anonymous reporting platform is provided to report breaches of information security policies or
procedures (“whistleblowing”). Management should demonstrate, and serve as a role model for, information
security policies, procedures, and controls.
Information Security Implementation Guide PAGE 52
Other Information- If employees and contractors are not made aware of their responsibility for information
security, they may cause significant damage to the organization. Motivated personnel are likely to be more
professional and trigger fewer accidents related to information security.
Poor management can cause staff to feel undervalued, resulting in a negative impact on the organization’s
information security. Poor management, for example, can lead to neglecting information security or, potential
misuse of the assets of an organization.
Implementation Guidance- An information security awareness program will strive to make workers and,
where appropriate, contractors aware of their information security responsibilities and the instances where
those responsibilities will be discharged.
In line with the information security policies and related procedures of the organization, and, information
security awareness plan should be introduced, taking into account the information to be protected of the
organization and the controls to be carried out to guard the information. The awareness plan will include a
range of awareness-raising events, such as promotions and booklet issuance or newsletter launches.
The awareness program should be organized in the context of the roles of the employees in the organization
and, if necessary, the expected awareness of contractors. the activities in the awareness program, ideally
annually, will be scheduled over time so that new workers and contractors can be identified and replicated.
The awareness program should also be frequently updated so that it conforms to the organizational policies
and procedures and draws on lessons learned from events in the area of information security.
Awareness training should be carried out as required by the information security awareness program of the
organization. Awareness training may take advantage of multiple distribution platforms, including classroom-
based, distance learning, web-based, self-paced, and others.
Information security training and curriculum will also cover key aspects such as:
Information security awareness and training should take place on a regular basis. Initial education and training
refer to those who transition to new positions or roles with significantly different information security criteria,
not just to new beginnings, but should take place before the role is active.
In order to implement education and training efficiently, the organization must establish an education and
training program. The plan will be consistent with the information security policies and procedures of the
organization, taking into account the information to be protected and the safeguards that have been
implemented in place to protect the information. The curriculum should consider various forms of education
and preparation, e.g., seminars or self-study.
Other Information- When designing an awareness plan, it is important not only to concentrate on ‘what’ and
‘how,’ but also on ‘why.’ It is crucial for employees to understand the purpose of information security and the
possible positive and negative effects on the organization from their own behavior.
Awareness, training, and awareness can be part of other training programs, such as general IT or general
security training, or in collaboration with them. Awareness, education, and training programs should be
necessary and suitable for the duties, responsibilities, and skills of the person.
At the conclusion of an awareness, education, and training course for testing knowledge transfer, and
evaluation of employee comprehension may be carried out.
Control- A formal and informed administrative process will be in place to take action against employees who
have committed an information security breach.
Implementation Guidance- Legal proceedings should not be conducted without prior verification that an
information security violation has occurred.
The systematic disciplinary process will ensure correct and fair treatment for employees suspected of
breaching information security. The standard disciplinary process will allow for a graduated response that
takes into account factors such as the extent and severity of the violation and its effect on business, whether
or not it is either a primary or repeat incident, whether or not the perpetrator was adequately educated,
applicable regulations, business contracts and other factors as appropriate.
The disciplinary method can also be seen as a barrier to prevent employees from breaching the information
security policies and procedures of the organization and other violations of information security. Deliberate
infringements may require immediate action.
Other Information-The disciplinary process can also become a motivation or encouragement if appropriate
measures are defined for extraordinary actions with regard to information security.
Termination and Change of Employment Its objective is to safeguard the interests of the organization as part
of the adjustment or termination of employment.
Implementation Guidance- Communication of termination duties may include on-going information security
requirements and legal responsibilities and, as applicable, the duties found in the confidentiality arrangement
and the terms and conditions of employment to be maintained for a specified time following the termination
of the job of the employee or contractor.
Responsibilities and duties still valid after termination must be included in the terms and conditions of
employment of the employee/contractor.
Other Information- The human resource function is generally responsible for the overall termination process
and works with the supervisor to manage the safety measures of the relevant procedures. This termination
process is carried out by an external party in compliance with the arrangement between the organization and
the external party in the event of a contractor appointed by an external party. Changes in personnel and
operating arrangements may be required to inform employees, clients, and contractors.
Asset Management
Implementation Guidance- An organization will identify important assets in the information lifecycle, and
document their importance. The life-cycle of information should include creation, processing, storage,
transmission, deletion, and destruction. Documentation of specific or current inventories should be
maintained, as per need.
The inventory of assets should be accurate, up to date, compatible, and matched with other inventories. The
ownership of the asset should be allocated to each of the specified assets and the classification should be
specified.
Information Security Implementation Guide PAGE 55
Other Information- Asset inventories help to ensure adequate protection for certain purposes such as safety
and health, insurance, or financial (asset management) reasons. This may also be achieved for other required
factors.
As with humans, life is their greatest asset, similarly, the organization too have its assets. when you keep
yourself safe and stable, you live longer, in the same way, if the company keeps its assets protected, its
reputation and success on the market lasts longer.
For a healthy business, identifying the assets, making an inventory of the assets, and assigning an owner to the
assets is important. The guidelines for and the implementation of these Asset Management Guidelines are
provided in Annex A.8.
Implementation Guidance- Individuals who qualify as asset owners are management authorized and are
responsible for the asset whole throughout its life cycle.
A process is usually enforced to make sure timely assigning of asset ownership. Ownership should be allocated
when creating assets or transferring assets to the organization. The owner of the asset should adequately
manage the asset over the entire asset life cycle.
– Defines and regularly updating access constraints and classifying important assets taking into consideration
the existing access management policies;
Other Information- The defined owner may be either a person or an entity that has authorized management
control over an asset’s entire lifecycle. The defined owner doesn’t necessarily have ownership rights to the
assets.
Routine duties may also be assigned, for example to a custodian who takes care of the properties on a day-to-
day basis, but the responsibility remains with the owner.
It can be helpful to identify groups of assets that function together to provide a specific service for complex
information systems. In this situation, the owner is responsible for the delivery of the service, including its
asset operation.
Information Security Implementation Guide PAGE 56
Acceptable Use of Assets & A.8.1.4 Return of Assets this is a part of assets management previous article was
based on same which is continue in this article.
Implementation Guidance- The information security requirements of the organization’s assets along with
information and information processing facilities and resources should be made aware to employees and
external users who use or have access to the company’s assets. They will be responsible for their use and all
other usage carried out on their own responsibility, of any information processing services.
Implementation Guidance- The termination process must be legally concluded with the return of all tangible
and electronic assets previously assigned owned or entrusted to the organization.
When an employee or external user buys the equipment of the company or uses his / her own personal
equipment, it is important to follow protocols to ensure that all relevant information is transmitted to the
company and safely removed from the equipment.
In situations where an employee or external user is aware that this information is necessary for ongoing
operations, it should be reported and transmitted to the organization. During the notice period of termination,
unauthorized copying of sensitive information (e.g., intellectual property) by terminated workers and
contractors should be monitored by the company.
Information Classification
Information Classification Its objective is to ensure that the information is properly secured, in accordance
with its significance to the organization.
Implementation Guidance- Classifications and associated information security measures will also include
regulatory standards, which take into account market demands for information sharing or restriction. Assets
other than information may also be classified according to the information classification stored, processed,
otherwise handled or protected by the asset. Information asset owners would be responsible for their
classification.
Information Security Implementation Guide PAGE 57
The classification system will include classification standards, as well as classification analysis guidelines over
time. The level of security found in the system will be determined by evaluating confidentiality, integrity and
availability, and all other information specifications under consideration. The scheme should be aligned with
policy on access control
The scheme will be consistent with the policy on access management. Each level should be given a name
which makes sense for the application of the classification scheme. The scheme should be consistent across
the organization to ensure that everyone classifies information and related assets in the same way, has a
common understanding of the security standards, and applies appropriate protection.
Classification should be part of the organization ‘s processes and be consistent across the organization.
Classification results may highlight the importance of assets, depending on their sensitivity and their criticality
to the organization, e.g., in terms of confidentiality, integrity, and availability. Classification findings should be
revised to reflect changes in their importance, responsiveness, and criticality during their life-cycle.
Other Information- Classification offers a concise summary of how to manage and secure knowledge for those
who deal with it. This is facilitated by establishing information groups with similar protection needs and
defining information security procedures that apply to all or some of the information in each group. This
approach eliminates the need for case-by-case risk assessment, as well as personalized control design.
Information can cease to be sensitive or critical after a certain duration of the time, when the information is
made public, for example. These aspects should be taken into account, as over-classification may result in the
implementation of unnecessary controls resulting in additional expenditure or, on the contrary, under-
classification may threaten the achievement of business goals.
Labeling of Information & A.8.2.3 Handling of Assets is based on ISO in this article these two topics has been
explained.
Implementation Guidance- Information labeling procedures need to cover information in physical and
electronic formats and its related assets. The labeling will represent A.8.2.1 defined classification scheme. The
labels are to be clearly identifiable. The protocols will provide instructions on where and how labels are
applied taking into account whether the information is obtained or the assets are managed based on media
forms. The procedures that identify situations where labeling is absent, e.g. non-confidential information
labeling to scale back workloads. Employees and contractors should be made aware of the procedures for
labeling.
An appropriate classification label should be included in the output from the system containing information
classified as sensitive or critical.
Information Security Implementation Guide PAGE 58
Other Information- Classified information labeling is an essential prerequisite for agreements for information
sharing. The common labeling form is physical labels and metadata.
Information labeling and associated assets can sometimes be detrimental. Subject to classified assets, insider
assets or external attackers are easier to identify and steal.
Implementation Guidance- Procedures should be developed for the handling, processing, storing, and
communication of classified information.
– Access restrictions that support the security standards for each classification level;
– Security to a level consistent with the security of the original information for temporary or permanent copies
of information;
– Clear marking for the authorized recipient of all copies of the media.
The scheme for classification used in the organization, even if the classification levels are similar, may not
equate to the schemes employed by other organizations; in addition, information moving across organizations
can vary according to their contexts, even if their classification schemes are equal.
Accords with other organizations that include sharing information should include methods of classifying that
information and interpreting other organizations’ classifications labels.
Media Handling
Media Handling Its objective is to Stop unauthorized release, alteration, deletion, or destruction of
information contained in the media.
Implementation Guidance- The following guidelines should be considered for the management of removable
media:
Information Security Implementation Guide PAGE 59
If not needed, the contents of any reusable media that are to be removed from the organization should be
made unrecoverable;
Where applicable and practicable, authorization should be needed for the removal of media from the
company and a record of these removals should be maintained in order to preserve the audit trail;
In compliance with manufacturers’ standards, all media should be kept in a secure and safe environment;
Where confidentiality or integrity of data is important, cryptographic techniques for securing data on
removable media must be used;
In order to minimize the possibility of media loss when storage data is still needed, the data should be moved
to fresh media before being unreadable;
Multiple copies of important data should be stored in different media to further reduce the possibility of
accidental data damage or loss;
Registration of removable media should be taken into account to limit the possibility of data loss;
Removable media drives should only be allowed if there is a business purpose to do so;
Where there is a requirement for the use of disposable media, the movement of data to such media will be
supervised.
Where there is a need to use disposable media, the transition of data to such devices will be monitored.
Procedures and levels of approval will be reported.
Implementation Guidance- Formal protocols for the secure disposal of media should be established to reduce
the possibility of leakage of sensitive information to unauthorized persons. The protocols for the secure
processing of sensitive information media should be proportionate to the sensitivity of that material.
Confidential media should be processed and disposed of safely through, e.g. by incineration or shredding, or
data erasure for use by another application within an organization.
Procedures should be in place to identify the items that could need safe disposal
Instead of trying to isolate important objects, it could be better to plan to safely collect and dispose of all
media items;
Many organizations offer media collection and disposal services; care must be taken to select a suitable
external party with adequate controls and experience;
In order to maintain an audit trail, the disposal of confidential items will be logged.
The aggregation effect should be taken into account when collecting media for disposal, and a large number of
sensitive information can become vulnerable.
Other Information- Damaged devices containing sensitive data can require a risk assessment to evaluate the
physical loss of objects instead of being sent to them for repair or discharge.
Also Read: ISO 27001 Annex: A.8.2.2 Labeling of Information & A.8.2.3 Handling of Assets
Control- Information media should be protected from unauthorized access, misuse or corruption during
transportation.
Implementation Guidance- For the safety of media containing information transported, the following
guidelines should be considered:
Access Control
Implementation Guidance- Asset owners should lay down appropriate rules for access control, access rights,
and limits on particular user roles to their assets, with the level of info and the strictness of controls
representing the related information security risks. Access controls are both logical as well as practical, so they
should be taken together. Users and service providers should be provided with a clear, transparent statement
of the business requirements that access controls should meet.
The inbox is always open in my brain, and anyone can get in any time and access me. Turning it off is taking
back control. I decide who gets in. It’s about privacy, having a self.
-Jill Soloway
Access rights management in distributed and networked environments which recognizes the kinds of available
connections;
Segregation of access management functions, e.g., access request, access authorization, access
administration;
formal authorization requirements for access applications;
Requirements for periodic review of the rights to access;
Removing access rights
Archiving details of all important incidents relating to the use and management of user identity and secret
authentication information;
Organization’s role with privileged access.
Other Information- When defining rules on access control, care needs to be taken to understand the following
implications:
Establishing rules underpinned by the principle “Everything is generally prohibited unless expressly
authorized” rather than the weaker rule “Everything is generally permitted unless expressly prohibited”;
Changes to information labels automatically introduced by information processing facilities and those
implemented at the user’s discretion;
User authorization changes that are automatically initiated by an administrator and the information system;
Rules requiring specific prior approval and those without approval
Regulations on access control should be assisted by defined and structured procedures.
Access management based on responsibilities is a method that many organizations have successfully used in
relating access rights to business roles.
Also Read: ISO 27001 Annex: A.8.3 Media Handling
In the guidelines of access control policy, two of the common principles are:
Need-to-know: only the information you need to execute your tasks is accessible to you (specific tasks/roles
mean different needs-to-know and therefore different access profiles);
Need-to-use: you grant access to information processing facilities (IT software, programs, protocols, rooms)
that you would need to execute your task/job/role.
In order to keep the organization’s assets (IT, software, programs, and protocols) safe, certain access controls
are required to prevent unauthorized users from accessing your assets. The criteria for access management,
access rights, and limitations of specific user roles on their assets are being defined in Annex 9 of Standard
27002.
Control- ISO 27001 Annex: A.9.1.2 Access to Networks and Network Services Only network and network
facilities which have expressly been approved for use will be made available to users.
Implementation Guidance- A policy on the use of networks and network policy should be developed.
Following points should be covered in this policy:
Authorization procedures for determining who is permitted to access which networks and Networking
services;
Management processes and policies for securing access to network interfaces and network services;
the medium for networking and network services (for example, using VPN or wireless network);
Access to various network services requires user authentication;
Network service usage monitoring.
The network services policy should comply with the access control policy of the organization.
Other information- Unauthorized and insecure network connections will impact the entire organization. Such
monitoring is especially essential for network connections to sensitive or vital business applications or users in
high-risk environments, e.g. public or external areas beyond the management and control of information
security of an organization.
In order to keep the organization’s assets (including network and networking services) safe, certain access
controls are required to prevent unauthorized users from accessing your network. The guidelines that policy
for access management, access rights, and limitations of specific user roles on the network are being defined
in Annex 9.1.2 of Standard 27002.
User Access Management Its objective is to ensure approved user access and avoid unauthorized access to
systems and facilities.
Use unique user IDs to encourage users to be connected to and hold accountable for their actions; use of
shared IDs should only be permitted where they are required for business or operational purposes and should
be authorized and documented.
Immediately disable or delete user IDs of people that have left the organization.
Identifying and deleting or disabling redundant user IDs on a periodically
Making sure that other users do not receive redundant UIs.
Other information- The provision or revocation of access to information or information processing facilities is
typically a two-step procedure:
In order to keep the organization’s assets safe, we should design certain policies for access controls and
prevent unauthorized users from accessing our organization. User Access management is one of the main
access controls that should be in place so to keep up with the confidentiality, availability, and integrity. The
Information Security Implementation Guide PAGE 63
guidelines for the policy of User Access Management, Unique User IDs, User Authorization, access rights, and
limitations of specific user roles are being defined in Annex 9.2. of Standard 27002.
Also Read: ISO 27001 Annex: A.9.1.2 Access to Networks and Network Services
Implementation Guidance- The process for granting or revoking access rights granted to user IDs should
include:
Approval from the Information System Owner or the Service User Authorization; separate approval by
management of the Access Rights may also be advisable;
Verify, in line with other criteria such as the segregation of duties, that the level of access given is sufficient for
access policies;
Ensuring that access privileges (e.g., by service providers) are not enabled prior to the completion of
authorization procedures;
Maintaining a central database of access privileges given to a user ID for accessing information systems and
services;
Adapt users’ access rights who have changed their roles or jobs, restrict or block privileged access
automatically by users who left the organization;
Reviewing access privileges with owners of information systems or facilities periodically
Other Information- The establishment of user access roles based on organizational criteria should be taken
into account, which summarizes the number of access privileges in typical user access profiles. Access requests
and reviews at the level of these positions are easier to handle than at the level of individual privileges.
Consideration should be given to incorporating clauses into contracts for personnel and service that define
sanctions if personnel or contractors attempt unauthorized access.
Review of User Access Rights & A.9.2.6 Removal or Adjustment of Access Rights these two topics has been
explained.
Implementation Guidance- The following should be considered while reviewing the access rights:-
Access rights of users should be reviewed at regular intervals and after any changes, such as promotion,
demotion or job termination;
User access rights for moving from one role to another within the same organization should be reviewed and
re-allocated;
The privileged access rights authorizations should be reviewed frequently
Information Security Implementation Guide PAGE 64
The allocation of access rights should be regularly reviewed to ensure that unauthorized privileges are not
obtained;
Regular reviews should be registered for changes to privileged accounts.
Other Information- This control probably accounts for potential weaknesses in the execution of the 9.2.1,
9.2.2 and 9.2.6 controls.
Implementation Guidance- Upon termination, an individual’s access rights to information and assets
associated with the facilities and services for information processing should be removed or suspended.
Whether access rights should be removed will be determined. Changes in employment should be reflected in
removing all access rights which have not been approved for the new job. The access rights which should be
removed or adjusted include the physical and logical access rights. The removal or adjustment of keys,
identification cards, information processing facilities, or subscriptions may be done by removal, revocation, or
replacement. Any documentation identifying employees and contractors’ access rights should reflect removal
or adjustment of access rights. If a departing employee or external user has identified passwords that are still
active for user IDs, these should be updated after termination or change of job, contract, or agreement.
Also Read: ISO 27001 Annex: A.9.2.3 Management of Privileged Access Rights & A.9.2.4 Management of Secret
Authentication Information of Users
Access rights for information and assets related to information processing facilities should be restricted or
withdrawn before the termination or change of jobs, based on the following risk factors:
Whether termination or alteration is initiated by the employee, external user or management team, and the
reason for termination;
Current responsibilities of client, external user or some other user;
Price of currently available assets.
In the current era, it’s always advisable to limit and control access privileges. For an organization, it’s really
important that its information assets and accessibility to those assets should always be protected. There
should exist Access rights to particular users and should be reviewed regularly. Annex 9.2 covers the guidelines
and implementation of controls to safeguard data getting accessed by unauthorized users or to users who are
departed from the organization.
Other Information- Access rights can be divided under some circumstances on the grounds that more people
are eligible than the leaving employee or external user, e.g. group IDs. In these cases, departing individuals
should be excluded from all group access lists, and arrangements should be made to warn all other employees
and external party users concerned not to share this information with the departing person.
Information Security Implementation Guide PAGE 65
In the event of terminations initiated by management, disgruntled employees or external users can
deliberately corrupt information or sabotage information processing facilities. In situations where employees
resign or are fired, they can be tempted to collect information for potential use.
User Responsibilities
User Responsibilities Its objective is the Responsibility of users for safeguarding their authentication
information.
Maintain confidential information on secure authentication to ensure that it is not leaked to the other parties,
including people of authority;
Avoid maintaining a record of confidential authentication details (e.g. on a document, software file or mobile
device) unless it can be stored safely and the storage system (e.g., password vault) has been approved;
Change details regarding secret authentication where potential vulnerability signs exist;
When passwords are used as secret authentication information, select quality passwords with a minimum
length of:
– It’s easy to remember;
– Will not endorse something that anyone else might easily guess or access using personal details, e.g., names,
phone numbers, dates of birth, etc.;
– Not susceptible to dictionary attacks (i.e., don’t contain words included in dictionaries);
– Free of identical, all-numeric or all-alphabetical characters consecutively;
– If temporary, change the first time you log on;
Do not disclose information about secret authentication of individual users;
Ensure proper password security when passwords are used in automated log-on procedures and stored as
hidden authentication information;
Do not use the same information regarding secret authentication for business or non-business purposes.
Other Information- Providing Single Sign On (SSO) or other secret information management tools for
authentication reduces the amount of secret authentication information that users need to protect, and can
thus increase the effectiveness of this control. But these tools can also increase the impact of disclosure of
information about secret authentication.
Information Security Implementation Guide PAGE 66
Similarly, the Organization’s also aims of keeping its confidential information safe and in proper security.
There are various roles in the organization and every user has its access rights, after the segregation of roles
and access rights, now it’s the duty of the users to keep their credentials, information and assets of the
organization safe, where we see, keeping password is most common way for securing any information, those
passwords should be of better quality. Annex 9.3 talks about the Responsibility of users for safeguarding their
authentication information.
System and Application Access Control Its objective is to put a stop to unauthorized access to systems and
applications.
Implementation Guidance- Access controls should be based on individual requirements for business
applications and in compliance with a specified access control policy.
Implementation Guidance- To validate the user’s claimed identity, an effective authentication technique
should be used Authentication alternative to passwords, like cryptographic means, smart cards, tokens, or bio-
metric methods, should be used where good authentication and identity verification is called for.
The process for logging into a system or application should be configured to reduce the risk of unauthorized
access. Accordingly, the login process should reveal a minimum information about the system or the
application in order to avoid giving any unnecessary assistance to an unauthorized person. The following will
provide a strong log-on procedure:
Information Security Implementation Guide PAGE 67
Do not display system or application identifiers until the log-in phase has been successfully completed;
Show a general alert warning that only approved users should have access to the computer;
Do not provide support messages during the login process that would benefit an unauthorized user;
Validate log-on information only after completion of all input data. When an error occurs, the system should
not indicate which part of the data is right or simply wrong;
Protect from brute force log-in attempts;
Record the successful and unsuccessful attempts;
Raise a security event when potential log-on control violation or active infringement is detected;
Display the following information when a successful login is completed:
– Date and time of the previous successful login;
– Details of any failed log-in attempts after the last successful log-in;
Do not display a password that is entered;
Stop inactive sessions after a given period of inactivity, especially in high-risk locations such as public or
external areas outside security management of the organization or on mobile devices;
Restrict connection times for high-risk applications to provide enhanced protection and reduce the
opportunity window for unauthorized access.
Other Information- Passwords are a simple way to recognize and authenticate based on a secret only known
by the user. Cryptographic means and authentication protocols are also possible to accomplish the same. The
strength of authentication of the user should be appropriate for the classification of the information to be
accessed.
If the passwords are transmitted in clear text during the login session over the network, the network “sniffer”
program can be used to capture them.
Implementation Guidance- The following points should be taken into account in a password management
system:
Impose the use of individual user IDs and passwords in order to ensure accountability;
Enable users to select and update their own passwords and provide a validation process to enable input
errors;
1. Enforce the selection of quality passwords;
2. Force users to update their passwords at the first login;
3. Enforce regular and, if necessary, make changes to your password;
4. Keep a list of previously used passwords and avoid re-use;
5. Do not display the passwords on the screen when you enter them;
6. Store password files separately from data on the application system;
7. Protected storing and transmission of passwords.
Information Security Implementation Guide PAGE 68
Similarly, the Organization also aims of keeping its confidential information safe and in proper security. There
are various roles in the organization and every user has its access rights, after the segregation of roles and
access rights, now it’s the duty of the users to keep their credentials, information and assets of the
organization safe, where we see, keeping password is most common way for securing any information, those
passwords should be of better quality.
Other Information- Many systems allow an independent authority to grant user passwords. Points (2), (4 ), and
( 5) in these circumstances are not applicable in these guidelines .. Users must select and maintain the
passwords in most situations.
Use of Privileged Utility Programs & Access Control to Program Source Code
Use of Privileged Utility Programs & A.9.4.5 Access Control to Program Source Code this two topics are
explain.
Implementation Guidance- The following guidelines should be taken into account when using utility programs
that could override system and application controls:
the use of procedures for identification, authentication, and authorization of utility programs;
Segregation of the utility programs from software applications;
Limiting the availability of utility services to the minimum practicable number of reliable, authorized users
(refer to 9.2.3);
Approval for the ad hoc use of utility programs;
Limiting the availability of utilities, e.g., for the time of the approved amendment;
Logging the use of utility programs;
Definition and documentation of levels of authorization for utility programs;
Deletion or disabling of all unused utilities;
Not allowing utility programs accessible to users accessing applications on systems requiring segregation of
duties.
Other Information- Most computer installations have one or more utility programs that can bypass application
controls and systems.
Implementation Guidance- To prevent the introduction of unauthorized functionality and to avoid unintended
changes, and to maintain the confidentiality of valuable intellectual property, it is necessary to strictly control
access to source code and related items (such as designs, specifications, verification plans, and validation
Information Security Implementation Guide PAGE 69
plans). For program source code, this can be achieved by controlling the central storage of such code,
preferably in program source libraries. In order to minimize the potential for misuse of computer applications,
the following guidelines will then be considered to control access to these source libraries:
Where appropriate, software source libraries should not be kept in operating systems;
The source code of the program and the source library of the program should be administered according to
procedures;
Support staff should have restricted access to program source libraries;
The updating of program source libraries and related objects, and therefore the issuing of software sources to
programmers, should be carried out only after sufficient authorization has been received;
The program listings should be stored in a safe environment;
The audit log of all accesses to program source libraries should be maintained;
Strict change control procedures may refer to the management and copying of software source libraries.
If the source code of the program is to be published, additional controls (e.g., digital signature) should be
taken into account to ensure its integrity.
Also Read: ISO 27001 Annex: A.9.4 System and Application Access Control
The Organization aims to keep its confidential information, which also includes codes for the program source,
secure. Also, it should be restricted and tightly regulated to utilities that can circumvent the system and
application controls. Annexes 9.4.4 & 9.4.5 discuss the application restriction and storing the source codes in a
secure environment.
Use of Privileged Utility Programs & Access Control to Program Source Code
Use of Privileged Utility Programs & A.9.4.5 Access Control to Program Source Code this two topics are
explain.
Implementation Guidance- The following guidelines should be taken into account when using utility programs
that could override system and application controls:
the use of procedures for identification, authentication, and authorization of utility programs;
Segregation of the utility programs from software applications;
Limiting the availability of utility services to the minimum practicable number of reliable, authorized users
(refer to 9.2.3);
Approval for the ad hoc use of utility programs;
Limiting the availability of utilities, e.g. for the time of the approved amendment;
Logging the use of utility programs;
Definition and documentation of levels of authorization for utility programs;
Deletion or disabling of all unused utilities;
Not allowing utility programs accessible to users accessing applications on systems requiring segregation of
duties.
Information Security Implementation Guide PAGE 70
Other Information- Most computer installations have one or more utility programs that can bypass application
controls and systems.
Implementation Guidance- To prevent the introduction of unauthorized functionality and to avoid unintended
changes, and to maintain the confidentiality of valuable intellectual property, it is necessary to strictly control
access to source code and related items (such as designs, specifications, verification plans, and validation
plans). For program source code, this can be achieved by controlling the central storage of such code,
preferably in program source libraries. In order to minimize the potential for misuse of computer applications,
the following guidelines will then be considered to control access to these source libraries:
Where appropriate, software source libraries should not be kept in operating systems;
The source code of the program and the source library of the program should be administered according to
procedures;
Support staff should have restricted access to program source libraries;
The updating of program source libraries and related objects, and therefore the issuing of software sources to
programmers, should be carried out only after sufficient authorization has been received;
The program listings should be stored in a safe environment;
The audit log of all accesses to program source libraries should be maintained;
Strict change control procedures may refer to the management and copying of software source libraries.
If the source code of the program is to be published, additional controls (e.g. digital signature) should be taken
into account to ensure its integrity.
Cryptography
Cryptography in this article explaining Cryptographic controls, Policy on the Utilization of Cryptographic
Controls & Key Management.
Control- A policy on the use of cryptographic controls to secure information should be developed and
enforced.
Implementation Guidance- The following should be considered when designing a cryptographic policy:
A management guide to the use of cryptographic controls across the organization, including the general
principles by which business information should be protected;
Based on the risk assessment, the necessary level of security should be calculated taking into account the
type, strength, and quality of the encryption algorithm necessary;
Usage of encryption to secure information transported by mobile or portable media devices or through
communication lines;
Approach to key management, including strategies for coping with the security of cryptographic keys and the
recovery of encrypted information in the event of missing, corrupted or damaged keys;
Roles and responsibilities, e.g. for who is responsible for whom
– Implementing policy
– key management including quality generation;
The standards to be followed in the organization for successful implementation (which solution for which
business processes are used);
The effect of encrypted information on controls that rely on content validation (e.g., malware detection).
When enforcing the cryptographic policy of the organization, consideration should be given to regulations and
national restrictions that may relate to the use of cryptographic techniques in different parts of the world and
to issues relating to the trans-border flow of encrypted information.
Confidentiality: use of information encryption to secure confidential or vital information, either stored or
transmitted;
Integrity/authenticity: use digital signatures or message authentication codes to check the authenticity or
integrity of confidential or vital information stored or transmitted;
Non-repudiation: use of cryptographic techniques to provide evidence of an occurrence or non- occurrence
Authentication: Use of cryptographic techniques to authentically request access to or transactions with users,
entities, and resources of systems.
Other Information- Making a judgment as to whether a cryptographic solution is suitable can be seen as part
of the broader risk assessment and control selection process. This assessment would then be used to decide if
cryptographic control is sufficient, what form of control should be used, and for what function and business
processes.
A policy on the use of cryptographic controls is important to optimize the benefits and reduce the risks
associated with the use of cryptographic techniques and to prevent inappropriate or incorrect use. Expert
consultation should be taken into consideration in selecting suitable cryptographic controls to meet the
objectives of the information security policy.
The Organization aims to keep its information within the triads of the CIA. They also ensure the proper and
efficient use of cryptography to protect the confidentiality, authenticity and/or integrity of the information
Information Security Implementation Guide PAGE 72
and information processing facilities. Annex 10 discusses the cryptographic controls and policies for those
controls that an organization should maintain and implement over their entire life cycle.
Also Read: ISO 27001 Annex: A.9.4.4 Use of Privileged Utility Programs & A.9.4.5 Access Control to Program
Source Code
Implementation Guidance- The policy should provide criteria for handling cryptographic keys over their entire
life cycle, including generating, processing, archiving, retrieving, transmitting, removing, and destroying keys.
Cryptographic algorithms, primary lengths, and implementation methods should be chosen in line with best
practice. Appropriate key management includes safe processes for generating, processing, archiving,
retrieving, transmitting, removing and destroying cryptographic keys.
All cryptographic keys should be safe against change and loss. In addition, confidential and private keys
require protection against unauthorized use as well as disclosure. The equipment used for generating,
processing, and archiving keys should be physically secured.
A key management framework should be based on an agreed set of principles, protocols, and appropriate
methods for:
The authenticity of public keys should also be considered in addition to managing secret and personal keys
safely. This authentication process may be carried out using public key certificates, which are usually provided
by a Certification Authority, which should be a recognized organization with adequate controls and procedures
in place to provide the necessary degree of confidence.
The nature of service level agreements or contracts with external suppliers of cryptographic services, e.g. with
the Certification Authority, will cover issues of accountability, reliability of services, and response times for the
delivery of services.
Other information- The control of cryptographic keys is important for the successful use of cryptographic
techniques. Further information on key management is provided in ISO / IEC 11770.
ISO 27001 Annex: A.10 Cryptography techniques may also be used to protect cryptographic keys. Procedures
would need to be taken into account when managing legal demands for access to cryptographic keys, e.g. it
might demand that encrypted information be made accessible as proof in a litigation case in an unencrypted
form.
Physical and Environmental Security in this article explain Secure areas, Physical Security Perimeter and
Physical Entry Controls.
Implementation Guidance- When appropriate, for physical security perimeters, the following guidelines
should be considered and implemented:
Security perimeters should be established and the location and intensity of each perimeter should depend on
the security requirements of the assets inside the perimeter and on the results of the risk assessment;
The building or facility perimeters should be physically secure (i.e. there are no perimeter gaps or places
where a break-in can easily occur); the site’s exterior buildings, walls, and floors should be securely built and
all external doors should be properly secured against unauthorized controlled entry (e.g. bars, alarms, locks);
Doors and windows should be locked when the windows are unattended and external security, especially at
ground level, should be considered;
There should be a manned reception area or other methods of physical access control for the site or building
and only authorized personnel can access to sites and buildings.
Physical barriers to prevent unauthorized physical access and environmental contamination should be built,
wherever applicable;
Information Security Implementation Guide PAGE 74
All fire doors should be alerted, monitored and tested alongside walls in order to determine the level of
resistance needed in accordance with appropriate state, national and international standards; should act in a
failsafe fashion in accordance with the Local Code;
Appropriate intrusion detection systems, according to the national, regional, or international standards shall
be installed and tested regularly for the coverage of all exterior doors and accessible windows. Unoccupied
areas should be alarmed at all times.
Organization-controlled information management facilities should be segregated physically from those
operated by outside parties.
Other Information- The physical protection of the organization’s premises and information processing facilities
can be achieved by creating one or several physical barriers. Additional protection is offered by using multiple
barriers when a single barrier failure does not immediately affect security.
A protected space may be a closed office or multiple rooms that are enclosed with an internal physical
protection restriction. Additional barriers and perimeters for the physical access control between areas with
various security requirements within the safety perimeter may be necessary. And in the case of buildings with
assets for multiple organizations, special attention to be given to physical security of entry.
The use of physical controls especially for the safe areas, as set out in the risk assessment, needs to be
adjusted to the technical and economic circumstances of the organization.
The Organization wishes that its information to remain within the CIA triads. They also ensure that the
physical security controls are properly and efficiently implemented to protect the confidentiality, authenticity
and/or integrity of the organization’s information and information processing facilities. The physical and
environmental protection of the company is covered in Annex 11 of ISO 27002.
Visitors should be registered on the date and time of their entry and departure and should supervise all
visitors, without prior approval of their access; Access should be given for certain approved purposes only, and
guidelines should be provided regarding safety and emergency procedures specifications for the region.
Visitors’ identity should be authorized using a suitable means;
Access should be limited to areas where information is processed or stored by means of suitable access
controls, for example, the introduction of a two-factor authentication system, such as an access card and a
secret PIN;
Securely maintaining and monitoring of a physical logbook or electronic audit trail of all access records;
Every employee, contractor and an external person should wear some visible identification and should inform
security personnel immediately if they meet unescorted people and anyone who does not have visible ID;
Information Security Implementation Guide PAGE 75
Limited access to secure areas or confidential information processing facilities should only be allowed to the
employee who is external support services when necessary; access authority and monitoring should be
provided;
Access privileges to protected areas should be periodically reviewed, updated and, revoked. where necessary.
Equipment
Equipment Its objective is to avoid loss, damage, theft, or compromise of assets and disrupt the operations of
the organization.
Control- Equipment should be secured against power failures and other disruptions caused by the supporting
infrastructure failures.
Implementation Guidance- The support facilities (e.g., power, telecommunications, water, gas, sanitation, air
conditioning, and ventilation) should consider the following points:
Other Information- Additional redundancy can be achieved through several routes from more than a single
utility provider for network connectivity.
Also Read: ISO 27001 Annex: A.11 Physical and Environmental Security
Implementation Guidance- The following cable safety guidelines should be taken into account:
power and telecommunications lines should be underground or subject to appropriate, alternative, security
into information processing facilities where possible;
Power cables should be isolated in order to avoid interference from communication cables;
Additional controls to reflect on sensitive or critical systems include:
Installation of reinforced ducts and locked rooms or boxes at inspection and termination points;
Electromagnetic shielding for cable protection;
Initiation of technical sweeps and physical inspections of unauthorized cable devices;
Access controlled to cable rooms and patch panels.
Equipment Maintenance, Removal of Assets & Security of Kit and Assets Off-Premises
Equipment Maintenance, A.11.2.5 Removal of Assets & A.11.2.6 Security of Kit and Assets Off-Premises.
Implementation Guidance- The following equipment maintenance guidelines should be taken into account:
Equipment should be maintained according to the service intervals and specifications recommended by the
supplier;
Repair and service equipment should only be performed by authorized maintenance personnel;
Information Security Implementation Guide PAGE 77
All suspected or actual defects, preventive and corrective maintenance, and records should be kept;
Appropriate checks should be carried out when maintenance equipment is scheduled, bearing in mind
whether maintenance is done by on-site or external personnel; confidential information from equipment
should be disclosed if required, or sufficient maintenance personnel should be cleared;
All maintenance requirements of insurance policy should be fulfilled;
After its maintenance, it should be inspected before bringing equipment back into service to ensure that it
does not get tampered or malfunction.
Control- Without prior authorization, equipment, information, or software should not be taken off-site.
It is important to recognize employees and external users who are approved for the removal on-site of assets;
Asset removal time limits should be established and compliance returns verified;
Assets that are removed from the site and recorded when returned should be recorded where necessary and
appropriate.
Anyone who manages or uses assets should document the identity, role, and affiliation and return this
documentation with the equipment, information, or software.
Other Information- Spot checks conducted for the identification of unauthorized removal of assets, may also
be performed on the site in order to identify non-authorized recording devices, weapons, etc. Such spot
checks should be done in accordance with the laws and regulations applicable. It should be noted to
individuals that spot inspections are conducted and only with authorization to comply with the legal and
regulatory requirements should be performed.
Also Read: ISO 27001 Annex: A.11.1.3, A.11.1.4, A.11.1.5 & A.11.1.6
Control- The security of off-site assets should be applied to the various risks of working outside the premises
of the organization in mind.
Implementation Guidance- Management should be authorized to use any information storage and processing
equipment outside the premises. This refers to organization-owned equipment that owns equipment privately
and is used for the organization’s benefit.
Information Security Implementation Guide PAGE 78
For the safety of off-site facilities, the following guidelines should be considered:
Equipment and media began to not leave the premises publicly unattended;
Manufacturers’ protective device instructions, e.g., for exposure protection to strong electromagnetic fields,
should be complied with at all times;
Risk identification and effective controls should be determined for off-site locations, such as homeworking,
telework and temporary locations, such as lockable filing cabinets, clear desk instructions, computer access
controls and safe office communication;
A log specified by the chain of custody for equipment, containing at least the names and organizations of
those who are responsible for that equipment should be maintained if the equipment is transferred between
separate entities or external parties.
In determining the best controls, risk, such as damage, theft, or eavesdropping, could vary significantly
between locations.
Other Information- Informative equipment for storage and processing comprises all types of personal
computers, organizers, phones, smart cards, paper, and other forms held for homework or transportation
away from the usual place of work.
The risk can be avoided by discouraging certain workers from working off-site or reducing the use of portable
IT equipment;
Secure Disposal or Re-use of Equipment, Unattended User Equipment & Clear Desk and Clear Screen Policy
Secure Disposal or Re-use of Equipment, A.11.2.8 Unattended User Equipment & A.11.2.9 Clear Desk and Clear
Screen Policy
Implementation Guidance- Equipment should be tested to ensure that the storage media is contained or not
until disposal or re-use. In order to make original information inaccessible instead of using the standard delete
or a software functionality, the storage media with confidential or copyrighted information should physically
be destroyed or information destroyed, deleted, or overwritten using techniques.
Other information- Determining whether the items should be physically destroyed rather than sent to repair
or discard damaged equipment containing storage media can require a risk assessment. The use or reuse of
equipment may compromise information.
In addition, full disk encryption reduces the risk of confidential information being disclosed when equipment is
disposal or redeployed if:
Encryption process is strong enough to cover the entire disk (including slack space, swap files, etc.);
Encryption keys are sufficient to resist attacks by brute force;
The encryption keys are confidential themselves (e.g. never stored on the same disk). (Refer Clause 10)
Information Security Implementation Guide PAGE 79
Safe overwriting techniques for storage media differ according to the technology for storage media. To ensure
they are applicable to storage media technology, overwriting tools should be reviewed.
Implementation Guidance- Every user should be informed of their responsibility to implement the security
requirements and procedures for protecting unattended equipment. Following should be informed to users:
Once done, terminate active sessions, unless protected with correct locking mechanisms, for example. A
screen saver protected with a password
When no longer required, log-off from apps or network services;
Unauthorized use by key locks or devices, such as access to passwords, of secure computers or mobile devices,
when not in use.
The Organization wishes that its information equipment to remain within the CIA triads. They also ensure that
the security controls are properly and efficiently implemented to protect the confidentiality, authenticity
and/or integrity of the organization’s information and information processing facilities even at the time of
their disposal. The disposal or reuse of any device containing storage medium, covered in Annex 11.2 of ISO
27002.
Also Read: ISO 27001 Annex: A.11.2.4 Equipment Maintenance, A.11.2.5 Removal of Assets & A.11.2.6 Security
of Kit and Assets Off-Premises
Implementation Guidance- Clear desk and clear screen policy should include organization’s information
classifications, legal, contractual requirements, and associated risk and cultural aspects. It is important to
consider the following guidelines:
When not needed, confidential or critical information for businesses (e.g., on paper or in electronic storage
media), especially when the office is vacated, should be closed away (ideally in safe or cabinet or in some type
of safe furniture).
Computers and terminals should be left signed off or secured by a password, token, or similar users’
authentication mechanism, regulated with screen and keyboard locking mechanism, when unattended.
It should not be permitted to use photocopiers and other reproductive technology (e.g., scanners, digital
cameras);
Sensitive or classified information media should immediately be removed from printers.
Other Information- A clear desk/screen policy minimizes the risk of unexpected access, information loss, and
damage during and outside normal hours of work. Security systems or other forms of safe storage may also
protect information stored on them from disasters such as earthquakes, floods, or explosions.
Consider the use of PIN-code printers, so only originators are able to get their print-outs and only when they
stand beside the printer.
Information Security Implementation Guide PAGE 80
Operations Security
Operations Security in this article explain Operational procedures and responsibilities, Documented Operating
Procedures, Change Management & Separation of Development, Testing and Operational Environments.
Operating procedures and documented procedures for system operations should be treated as managerial
authorized formal documents and alterations. Where technically feasible, IT systems should be consistently
administered using the same procedures, tools, and utilities.
Implementation Guidance- The following things will in particular be taken into account:
the assessment of the possible impacts of these changes, including the effects on information security;
Procedure for formal approval of changes proposed;
Verification of compliance with information security requirements;
Communication to all or any specific individuals about the changes in detail;
Failure to recover from costly improvements and unforeseeable incidents like abortion procedures and
responsibilities;
Providing an emergency procedure for making the changes required to resolve the incident quickly and
controlled.
In order to guarantee adequate oversight of all changes, structured management roles and procedures should
be enforced. An audit log with all relevant information should be retained when changes are made.
Other Information- A common cause of system failures or security failures is poor control over improvements
in information processing facilities and systems. Changes in the operating environment can have an impact on
the reliability of applications, in particular when transitioning from development to operational stage.
Implementation Guidance- Taking into account the criticality of the business system concerned, capability
requirements should be defined. System tuning and control should be implemented to ensure the quality and
reliability of the systems and, where possible, improve them. In order to detect problems in due time,
detective audits should be put in place. For future capacity requirements, the new business and system needs
and current and projected trends in information processing capacity should be taken into account.
Any resources with long procurement lead times or high cost should be given particular attention; managers
should also control the usage of the key system resources. Trends in use should be identified, especially with
respect to business applications or tools for managing information systems.
Managers will use the data to identify and remove possible bottlenecks and dependency on key workers who
may risk network protection or services.
By rising capacity or growing demand, adequate capacity can be achieved. Examples of capacity management
requirements include the following points:
Other Information- This control also includes the capacity of human resources, offices, and facilities.
Information Security Implementation Guide PAGE 82
Also Read: ISO 27001 Annex: A.11.2.7 Secure Disposal or Re-use of Equipment, A.11.2.8 Unattended User
Equipment & A.11.2.9 Clear Desk and Clear Screen Policy
Control- To reduce risks of non-authorized access or changes in the operational environment, development,
testing, and operational environments should be separated.
Implementation Guidance- It is important to define and enforce the degree of separation between
organizational, testing and development environments needed to avoid operational problems.
Rules should be described and reported for software transition from development to operational status;
Development and software should be run on various systems or computer processors and in various domains
or directories;
Changes to operating systems and applications shall be tested before they are applied to operational systems
in a testing or staging environment;
Tests should not be performed on operating systems except under extraordinary circumstances;
When not required, compilers, editors and other tool or system development utilities from operating systems
should not be accessible;
For operational and testing systems users should use different user profiles, and the menus should display
acceptable identifying messages in order to minimize the possibility of error;
Unless the test system equivalent controls are provided, sensitive data should not be copied to the test system
environment.
Other Information- Development and testing activity can lead to serious problems such as file, system
environment, or system failure unwanted modifications. There is a need to carry out substantial tests to avoid
unsafe access for developers to the operating system in a well-known to secure setting.
Where development and testing personnel have access to, or modification of operational data, the operating
system and its data may be unauthorized or untested. In some systems, fraud or untested or malicious code
could be misused in order to cause serious operational problems.
The confidentiality of operational information also concerns the development and testing of employees.
Unintended software or information changes may occur when the production and testing activities share the
same computing environment. Therefore, it is beneficial to reduce the possibility of unnecessary alteration or
Information Security Implementation Guide PAGE 83
exposure to operational software and business data by separating development, testing, and operational
environments.
Protection from Malware Its objective is ensuring that malware protection is provided to information and
information processing facilities.
Implementation Guidance
Malware protection should be supported by malware detection and repair software, awareness of the safety
of information, and adequate system access and management reviews on changes. The guidance should be
considered as follows:
Other information – The use of two or more software products protecting malware from various providers and
technology throughout the information processing environment can improve malware protection efficiency.
Protection from malware introduction during maintenance and emergency procedures, which could bypass
normal malware protection controls, should be taken with care.
Malware protection could under certain conditions cause operational disturbances.
The use of malware detection and software repair alone as a malware control is usually unsuited and usually
accompanied by malware operations.
Backup
Implementation Guidance – The organization’s information, software, and systems backup requirements
should be established with a backup policy. The policy of backup should define the requirements for retention
and protection. There should be sufficient backup facilities to ensure that all important information and
software can be recovered after a disaster or media failure.
Precise and full back up records should be prepared as well as recorded restoration procedures;
The nature and frequency of the backup (e.g., full or differential backups) should reflect the company’s
business requirements, security requirements for the information involved and criticality to the continued
operation of the organization;
Backups should be held at a remote location at a distance sufficient to prevent any damage at most locations
due to a disaster;
The appropriate level of physical and environmental protection should be given backup information (Refer
clause 11) in accordance with the standards at the main site;
The backup medium should be tested regularly to ensure that they can be used for emergency use if required;
combined with the restore procedures test and controlled for the required restore time. The check should not
be carried out with overwriting of the original medium if the backup or restore process fails and cause
irreparable data damage or loss;
Backups should be secured by encryption in cases where confidentiality is the concern.
“By failing to prepare, you are preparing to fail”
-Benjamin Franklin
Operating procedures should monitor backup performance and address planned backup failures to ensure
that the backups are complete according to the backup policy.
Information Security Implementation Guide PAGE 85
Backup procedures should be reviewed on a regular basis for specific systems and facilities to ensure they
meet the criteria of business continuity plans. In essential systems and facilities, all computer information,
software, and data required to restore the entire network during the event of a disaster should be protected
by backup arrangements.
The preservation period should be set, taking into account any conditions for permanent retention of archive
copies.
Logging and Monitoring Its objective is recording events and generating evidence.
IDs of User;
Activities of the system;
dates, times and key events details, such as log-on and log-off;
System ID or location and device recognition where possible;
records of the attempts to access the system successfully as well as rejected ones
successful and unsuccessful data records and other attempts to access resources;
system configuration alterations;
utilization of privileges;
the application and use of systems utilities;
Accessed files and access kinds;
network addresses and protocols;
Entry management system warnings.
Protective mechanisms such as anti-virus and intrusion detection systems are activated and deactivated as
required;
Transaction records done in applications by users.
Event logging inspires automatic control systems capable of producing integrated network monitoring
notifications and warnings.
Other information- Sensitive information and personally identifiable information can be used in event logs.
Proper measures in the field of privacy should be implemented.
System administrators should not be allowed to delete or deactivate logs of their own activities where
possible.
Information Security Implementation Guide PAGE 86
Implementation Guidance- Controls should be designed to protect against unauthorized log information
changes and operational logging problem, including the following:
Other information- System logs also contain a large amount of information, which is largely unique to
monitoring information security. The copying automatically to a second log of relevant message types or the
use of suitable device utilities or auditing tools to perform file interrogations and rationalizing should be
considered to help classify significant events for information security monitoring.
System logs must be protected, because data can create a false sense of security, when often modified or
deleted. To safeguard logs, real-time copy of logs to a system outside the control of a system
manager/operator.
Controls which should be implemented by the organization to preserve the CIA triad, Confidentiality, Integrity,
and Availability to maintain their critical, sensitive information in a secure manner it will help you to
understand and recognize the full scope of your organization’s security checks to protect your organization’s
activities and information equipment (assets) from attacks, and also to illustrate the backup policy to
safeguard if data gets lost due to intentional or natural hazards. It also helps in maintaining the logging and
monitoring of data transaction records, access records, and other records into protection.
Implementation Guidance- The logs of the information processing facilities that be manipulated under their
direct control by Private user account holders, so it is important to keep logs safe and reviewed to ensure the
privileged users are kept accountable.
Other information- A non-controlling system and network administrators can be used to monitor compliance
activities of the system and the network management.
Control- Clocks in all related information management systems should be integrated into a single reference
time source for an organization or safety domain.
The organization approach should be documented and implemented to obtain a reference time from an
external source and the way internal clocks can be synchronized reliably.
Other Information- Correct clock settings are essential to ensure that audit reports, which may be used for
investigation or as proof in legal or disciplinary proceedings, are reliable. Inaccurate audit logs can impede
such inquiries and damage their credibility. The main clock for logging systems can be used as a clock linked to
the radio time from a national atom. To maintain all servers in sync with the master clock, a network time
protocol can be used.
Implementation Guidance- To control changes in software on operational systems, the following guidelines
should be considered:
Trained administrators should only upgrade operational software, applications and libraries upon appropriate
management permission;
Only approved executable code and non-developed code or compilers should exist in operating systems;
Usability, safety, effects on other systems and user-friendly functions should only be included after successful
and extensive testing; testing should also be conducted on separate systems; ensure that each of the
corresponding program source libraries has been updated;
To retain control of all deployed applications as well as system documentation, a configuration control system
should be used;
Before introducing changes, a roll-back strategy should be in place;
All changes to operating system libraries should be maintained with an audit log;
Previous product versions must be maintained as a measure of contingency;
For as long as data is retained in the archive, old software versions and all required information and
parameters should be archived together with procedures, setup details, and software support.
The software provided by the vendor to operating systems should be maintained at the vendor support level.
Software vendors should cease older software versions over time. The organization’s risk of using faulty
software should be considered.
Information Security Implementation Guide PAGE 88
Every decision to upgrade to a new release should take account of business changes requirements and the
security of the release, for example by introducing new security functions or the number and severity of the
security of information problems affecting the release. When it is able to remove or reduce security
information vulnerabilities, software patches should be used.
Suppliers can only be provided with physical or logical access for assistance, if necessary, and with
management consent. The activities of the supplier should be monitored.
In order to avoid non-authorized changes that may lead to security defects, software can rely on externally
provided software and modules to monitor and control.
Technical Vulnerability Management Its objective is to avoid technological vulnerabilities from being exploited.
Implementation Guidance – An up-to-date and comprehensive asset inventory is necessary for the effective
management of technical vulnerability (see Clause 8). The software vendor, version numbers, current
installation status (e.g., what the software on which systems are installed), and the person(s) within the
organization responsible for the software are included in the basic details required to support technological
vulnerability management.
In order to identify potential technical vulnerabilities, appropriate and timely action should be taken. To
establish an efficient management process for technical vulnerabilities, the following guidelines should be
followed:
The organization should define and define technical vulnerability management roles and responsibilities,
including vulnerability monitoring, risk assessment of vulnerability, asset patching, asset tracking, and any
necessary coordination responsibilities.
Informative resources to identify and raise awareness about the relevant technical vulnerabilities for the
software and other technology (based on the asset inventory list, refer 8.1.1), should be updated based on
inventory changes and other new or useful resources;
A timeline to respond to potentially relevant technical vulnerabilities notifications should be defined;
The organization will recognize the associated risks and acts when a potential technological weakness has
been identified; these acts may include patching compromised systems, or enforcing other controls;
Information Security Implementation Guide PAGE 89
Actions should be carried out according to changes management protocols or following incident response
procedures in information security, depending on the degree to which a technical problem needs to be
handled.
The risk of the installation of a patch should be measured (those risks raised by the vulnerability must be
compared to the risk of installing the patch) if a patch is available from a valid source;
Before downloading the patch, it must be checked and reviewed to make sure that it is safe and does not lead
to side effects that cannot be tolerated; other tests, such as:
Switching off vulnerability related services or capabilities;
Adapting or adding network boundary access controls, such as firewalls;
Enhanced surveillance for real attacks;
Increase vulnerability awareness;
.For all procedures undertaken, an audit log should be maintained;
In order to ensure its efficiency and effectiveness, the technical vulnerability management process should be
monitored and assessed regularly;
High-risk systems should be addressed first.
The incident management activities should be compatible with effective technical vulnerability management
processes to relay vulnerability information to the incident response mechanism and provide appropriate
procedures that may occur;
Defining a procedure to tackle a situation that has identified a vulnerability, yet no appropriate
countermeasure exists. The organization should in this situation assess the risks associated with the known
vulnerability and define appropriate detective and corrective measures.
Also Read: ISO 27001 Annex: A.12.5 Control of Operational Software
Vendors also have to issue patches as quickly as possible under significant pressures. So, a patch cannot
adequately resolve the problem and has negative side effects. It is therefore possible. In some cases, it is not
easy to uninstall a patch when the patch is applied.
If it is not possible to adequately test patches, for example, due to costs or lack of resources, a delay in
patching can be taken into account to evaluate the associated risks, based on the experience of other users. It
may be helpful to use ISO / IEC 27031.
Control- Users should set and implement rules governing software installation.
Implementation Guidance – Strict guidelines on what types of software users can be developed by the
organization.
It would follow the concept of less privilege. Users may be able to install software if certain privileges are
granted. Identifies what software installation types are permitted (e.g. software updates or security patches)
Information Security Implementation Guide PAGE 90
and what installations are forbidden (e.g. software for personal use only and software whose malicious history
is unknown or suspect). Taking into account the role of the users concerned, these privileges should be given.
Other Information- Installing software uncontrolled on computer systems may lead to vulnerabilities and
information leakage, loss of integrity or other incidents of intellectual property security, or infringement of
intellectual property rights.
audit standards for access to systems and data should be negotiated with appropriate management;
Scope should be agreed and controlled on the technical audit tests;
Audit processing should be restricted to read-only access to applications and data;
Access, rather than read-only, should only be permitted for isolated copies of system files, which should be
deleted when the audit is completed, or provided with adequate security where such files are needed to be
held in accordance with the documenting audit requirements;
The criteria for special or additional processing should be defined and decided upon;
Audit tests that could affect the availability of the system should be carried out outside business hours;
To create a reference trail, all access should be controlled and logged.
Communications Security
Implementation Guidance – The monitoring of network information security and the security of connected
networks from unauthorized access should be undertaken. The following things will in particular be taken into
account:
Close coordination of management activities should be provided to improve the service offered to the
company and to ensure effective control of all information processing infrastructures;
Authentication of network systems;
Network connection should be restricted to devices.
Other Information – Further network protection information is available in ISO / IEC 27033.
Implementation Guidance – It is necessary to determine and regularly supervise the capability of the network
service provider to safeguard the agreed services and to agree to audit rights.
The required security structures such as security features, service rates, and management criteria for
particular facilities should be defined. It will ensure that these steps are enforced by network service
providers.
Other Information- Network services include connection provisions, a private network and value-added
network services and management solutions for network security, such as firewalls and intrusion detection
systems. The services vary from basic unmanaged bandwidth to complex value-added products and services.
Network services security technology such as authentication, encryption and network connection controls;
technical criteria required in compliance with security and network connection guidelines for the secured
reference of network services;
Network service procedures to restrict access, where necessary, to network services or applications.
Also Read: ISO 27001 Annex: A.12.7 Information Systems Audit Considerations
Implementation Guidance – One way to manage large networks sequence is to divide them into different
network areas. The domains may be selected based on confidence (e.g., public access domain, desktop
domain, server domain) or combined with organizational units ( e.g. human resources, finance, marketing).
The segregation can be done either through different physical networks or via various logical networks ( e.g.
virtual private networking).
You can describe the perimeter of any domain. Connection is permitted between network domains, but must
be managed by the gateway (e.g. firewall, filter router) on the perimeter. The requirements for network
segregation into domains and gateway access should be based on an evaluation of each domain ‘s security
requirement. The assessment should conform to access control policy, access requirements, information
processing value, and classification, as well as an understanding of the relative costs and performance impact
of the incorporation of suitable gateway technology.
Information Security Implementation Guide PAGE 92
Due to the poorly defined network perimeter, wireless networks require special treatment. With regard to
sensitive environments, all wireless access must be considered as external connections and separated from
internal networks until access is crossed by a gateway in line with the policy regarding network control before
access to internal systems has been granted.
Modern, standard-based wireless network authentication, encryption, and user-level access control
technologies may be appropriate if they are correctly implemented to connect directly to the company’s
internal network.
Other Information – Networks often reach beyond organizational borders because corporate partnerships are
formed, where information processing or networking facilities are interconnected or distributed. Such
extensions can increase the risk of unauthorized access to the networked information process of the
organization, some of which require protection because they are sensitive or critical to other network users.
Information Transfer
Implementation Guidance – The following items should be addressed in the procedures and controls required
to use communications facilities to transmit information:
either misdial or use the wrong stored number to send documents and messages to the wrong number
Furthermore, workers should not have publicly confidential discussions or through unreliable communication
networks, open offices and meeting places.
Other Information – Different kinds of communication facilities, including electronic mail, voice, facsimile and
video, can lead to the transfer of information.
The transfer of software may occur through a variety of various media, including Internet downloads and
purchases of off-shell products by suppliers.
The implications of business, legal and security related to electronic data exchange, electronic commerce, and
electronic communications and control requirements should be taken into account.
Electronic Messaging
Electronic Messaging
Control- Electronic messaging information should be adequately protected.
Implementation Guidance – The following should include information security aspects for electronic
messages:
Protecting messages against unauthorized access, change or denial of services in line with the organization’s
classification scheme;
ensure that the message is correctly addressed and transported;
Service reliability and availability;
Legal considerations, such as electronic signature requirements;
Approval before using external public authorities, such as instant messaging, social networking or sharing of
files;
Stronger standards of publicly accessible network authentication access management.
Other Information – There are various kinds of messages, such as e-mail systems, an exchange of electronic
data, and social networking.
and its allowed access or handling of confidential information, elements should be selected or added. to
identify confidentiality requirements or non-disclosure agreements,
Confidentiality and non-disclosure agreements would comply with all the laws and codes of integrity
applicable to them.
Confidentiality and non-disclosure agreements provisions should be regularly reviewed and these conditions
should be impacted when there are changes.
Other Information – Confidentiality and non-disclosure agreements protect organizational information and
inform signatory in an authorized and accountable fashion of their responsibility to protect the use of and
disclosure of information.
In a variety of cases, an organization may have to use different types of confidentiality and non-disclosure
agreements.
System Acquisition, Development and Maintenance in this article is explain A.14.1 Security Requirements of
Information Systems & A.14.1.1 Information Security Requirements Analysis and Specification.
Implementation Guidance – Information security needs should be defined using various approaches such as
derivation of policy and regulation enforcement criteria, threat analysis, incident assessment, and the use of
thresholds of vulnerability. All stakeholders will log and review the identification results.
The business assessment of the information concerned and possible negative effects on business resulting
from lack of sufficient protection should reflect information security standards and inspections.
Early stages of projects for information systems will include the definition and management of information
security specifications and related processes. Early consideration of information security requirements can
lead, for example, to more efficient and effective solutions at the design level.
confidence in the claimed identity of users required to meet the requirement to obtain user authentication;
Processes for access and authorization of all business users and privileged or skilled users;
Inform users and managers of their roles and responsibilities;
the necessary protection needs of the assets concerned, including accessibility, confidentiality, and integrity;
business process specifications, such as transaction recording and monitoring, non-repudiation specifications;
Requirements required by other security controls, such as logging and monitoring interfaces or data leak
detection systems.
Dedicated controls should be considered for applications that deliver infrastructure through public networks
or that carry out transactions.
A structured testing and procurement process must be followed if goods are purchased. Supplier contracts will
meet the security requirements found. If a proposed product has no safety features, the risk identified and the
associated controls should be reconsidered before the product is purchased.
The available security configuration guidance should be evaluated and implemented for the product aligned
with the system ‘s final software / service stack.
Product acceptance criteria, e.g., in terms of functionality, should be defined to ensure that the security
criteria identified are complied with. Before acquisition, products should be assessed according to these
criteria. Further functionality should be checked in order to ensure that additional risks are not unacceptable.
Other Information – In order to identify controls to meet information security requirements, ISO / IEC 27005
and ISO 31000 provide guidance on the use of risk management processes.
Securing Application Services on Public Networks Information about application services which pass through
public networks should be protected against fraudulent activities, contract disputes, unauthorized disclosure,
and modification.
Implementation Guidance – Information security requirements will include the following for application
services that cross public networks:
Information Security Implementation Guide PAGE 96
Each party requires a level of trust in the identity claimed by each other, for example, through authentication;
Authorizations for those who may authorize the content of key transnational documents, issue or sign them;
Ensure that communication parties are fully aware of their service provision or usage authorizations;
Determination and compliance with the conditions of confidentiality, integrity, proof that key documents and
contracts, for instance, related to contracts and tendering process, have been dispatched and received;
The level of trust required in key documents’ integrity;
Protection of any confidential information requirements;
Confidentiality and Integrity of any order transactions, payment details, delivery address information and
receipt confirmation;
the appropriate verification degree for the verification of a customer’s payment information;
Choosing the most appropriate form of payment settlement for fraud protection;
the extent of security required for keeping information about the order confidentiality and integrity;
Avoidance of transaction information loss or duplication;
liability for all transactions involving fraud;
Requirements for insurance.
The application of cryptographic controls will resolve many of the above concerns in compliance with legal
requirements.
An agreement that is registered and binds all parties to the agreed terms of service, including specifics of the
authorization, will help the application service arrangement between partners.
Resilience requirements should be considered against attacks that may include conditions to protect the
application servers or ensure that network interconnections required to provide the service are available.
Other Information – Applications accessible through public networks are threatened by a number of networks,
for example, fraudulent activity, contractual disputes, and public information. Detailed assessments of risk and
an appropriate range of controls are therefore important. The needed controls also involve authentication and
data transfer via cryptographic methods.
Secure authentication methods, e.g., using the public encryption key and digital signatures, can be used to
reduce risks by application services. Trusted third parties, if such services are necessary, can also be used.
Control- ISO 27001 Annex: A.14.1.3 Protecting Application Services Transactions in order to avoid incomplete
transmission, misrouting, unauthorized messaging modification, unauthorized dissemination, unauthorized
message replication, or replay, information concerning application service transactions should be covered.
Implementation Guidance – The following should include information security considerations for application
service transactions:
Security in Development and Support Processes Its objective is ensuring the creation and implementation of
information security in the information system development process.
Implementation Guidance – Secure development includes a safe infrastructure, architecture, software, and
system to be developed. The following considerations should be taken into account in a stable technology
policy:
The organization will be confident if development is outsourced that it complies with these principles of safe
development.
Information Security Implementation Guide PAGE 98
Control- In changing operating platforms, critical applications of business should be revised and tested to
ensure no adverse impacts on business or security.
Review of application control and processes of integrity to ensure that changes to the operating platform have
not compromised them;
Ensure that operating platform changes are communicated at the right time to enable proper tests and
reviews prior to implementation;
Ensuring that the business continuity plans are properly amended.
Other Information – Operating environments are operating systems, databases, and applications for
middleware. API modifications should also be tracked.
Restrictions on Changes to Software Packages
Control- Software package modifications should be discouraged, restricted to the modifications necessary, and
all changes controlled strictly.
Implementation Guidance – The vendor-supplied software packages should be used without alteration to the
extent necessary and feasible. The following points should be considered where a software package needs to
be modified:
Control- In the implementation of any information system implementation project, standards for secure
system engineered must be established, documented, maintained, and implemented.
Implementation Guidance – Secure IT Engineering procedures based on the principles of security engineering
should be established, documented, and applied in in-house IT Engineering. The need for data security and
accessibility should be balanced in all architecture layers (e.g., business, data, applications, and technology).
New technology for security threats needs to be evaluated and the design for documented attack patterns
should be reviewed.
Information Security Implementation Guide PAGE 99
Such principles and the developed engineering processes should be reviewed periodically, to ensure that they
contribute effectively to improved safety standards in the engineering phase. They should also be reviewed on
a regular basis to ensure that they remain relevant as concerning the combat against any new potential
threats and remain applicable to technical advancements and implemented solutions.
Where appropriate, the established principles of security engineering should be applied to outsourced
information systems through the agreements and other binding agreements between the organization and its
suppliers to whom the organization outsources. The business must ensure that the rigor of the security
engineering standards of suppliers is comparable to its own.
Other Information – Procedures for the creation of applications which have input and output interfaces should
apply secure engineering techniques. Secure engineering techniques provide guidance on user authentication,
secure control of the session, and validation of data, sanitation and removal of debugging codes.
Control – ISO 27001 Annex: A.14.2.6 Secure Development Environment in this Organizations should create
secure development environments and integration efforts for the entire life cycle of system development and
should be adequately protected.
Implementation Guidance – A secure development environment includes people, processes, and technology
in the development and integration of systems.
Organizations should evaluate the risks associated with the development of individual systems and establish
secure development environments for specific system development efforts, taking into account the following
points:
Outsourced Development
Information Security Implementation Guide PAGE 100
Control – The organization must monitor and monitor activity for the development of the outsourced system.
Implementation Guidance – A thorough test and verification is necessary during developing processes in new
and updated systems, including the preparation of detailed business schedules and input tests and expected
outputs under various conditions. Such tests are initially to be carried out by the development team for
internal developments. Specific approval assessments (for both internal and external developments) will then
be conducted to ensure the system is functioning according to expectations and only according to
expectations. The range of research should be proportional to the relevance and complexity of the program.
Control- New information systems, enhancements, and updated versions should be equipped with acceptance
testing services and related requirements.
Implementation Guidance – The system acceptance tests should include information security testing and
compliance with safe system development practices. Testing of received components and integrated systems
should also be carried out. Automated tools can be used by companies,
For example, tools for code analysis, vulnerability scanners, and the correction of security-related defects
should be verified.
Information Security Implementation Guide PAGE 101
In a realistic test environment, testing should be done to ensure the system does not introduce any
vulnerabilities and that tests are reliable in the organization’s environment.
Test data
Implementation Guidance – It should be avoided the use of operational information containing personal
information or any other confidential information for test purposes. Where personal information or otherwise
confidential information for testing purposes is used, all sensitive information and content should be
protected either by deletion or modification.
When used for testing purposes, the following guidelines should be used for the protection of operational
data:
The access management protocols applicable to the running application systems should also refer to the
application control systems;
Every time operational information is copied to the test setting, separate authorization should be granted;
Operational information should be deleted immediately after completion of the test environment from a test
environment;
In order to include an audit trail, copying and using operational details should be logged.
Supplier Relationships
Supplier Relationships in this article explaining Information Security in Supplier Relationships, and their
policies.
1. Identification and reporting of supplier forms, e.g. IT services, logistics services, financial services, IT
infrastructure components, which are accessible to the organization;
2. standardized supplier relationship management framework and lifecycle;
3. define the types of access to information allowed by distinct types of suppliers and monitor and
control the access;
Information Security Implementation Guide PAGE 102
4. Minimum information protection standards for any category of information and method of access
to provide the basis for each supplier agreement based on the business needs and requirements
and risk profile of the organization;
5. Processes and procedure for monitoring compliance, including third-party evaluation and product
validation, with defined information security standards for any type of supplier and type of access;
6. Controls for accuracy and completeness of information and transmission received by any party to
ensure the quality of information;
7. the types of obligations applicable for providers to protect information of the organization;
8. handling of customer control events and contingencies, including company and customer
responsibilities;
9. Resilience and, if necessary, recovery and contingency plans to ensure the availability by all parties
of information or processing;
10. Training in awareness of applicable policies, processes and procedures for the organization staff
involved in acquisitions;
11. Training in awareness of how the organization’s staff interacts with supplier staff on appropriate
rules of engagement and behavior based on provider type and level of supplier access to the
system and information of the organization;
12. Conditions to document the security of information and control requirements in an agreement
signed by both parties;
13. Management and maintenance of the information security during the transition phase of the
required information changes, information processing, and everything else that needs transfer.
Control- Any suppliers that view, process, store, communicate or provide IT infrastructure component
information for the organization should be defined and agreed with all applicable information security
requirements.
Implementation Guidance- Supplier agreements should be defined and recorded so that the organization and
the supplier do not misinterpret the obligations of the two parties to meet the applicable information security
requirements.
To meet the information security requirements identified, the following points should be considered for
inclusion in the agreements:
Description of information and methods of supply and access to the information to be provided or accessed;
classification of information by the classification scheme of an organization (see 8.2); mapping, where
possible, between the classification scheme for that organization and that for the supplier’s scheme of
classification;
legal and regulatory requirements, including data protection, copyright and intellectual property rights, and a
description of how they will be complied with;
obligation to enforce an agreed control plan, including access management, performance analysis, monitoring,
reporting and auditing for each contracting party;
Rules for acceptable use of information and, where necessary, unacceptable use;
Information Security Implementation Guide PAGE 103
either an explicit list of providers’ staff authorized to receive or access information or procedures,
authorization conditions, and the removal, access or receipt by supplier personnel of the information of the
organization;
Information security measures relating to a specific contract;
Requirements and procedures for incident management (in particular, communication and collaboration in
the remediation of incidents);
Specific protocols and information protection criteria, such as for emergency response, authorization
protocols, training and awareness criteria;
Sub-contracting related legislation, including the controls to be applied;
Applicable business partners, like the IT contact person;
screening needs of supplier workers, including test and notification responsibilities, if there is no completion
of the test, or where the results give rise to doubts or concerns;
right to audit the contracting supplier processes and controls;
Failure to resolve and resolve conflicts;
The obligation of the supplier to submit an independent report on the efficiency of controls and the timely
correction agreement for the relevant issues raised in the report periodically;
The obligations of the supplier to meet the security requirements of the organization.
Control- Supplier agreements will contain provisions to mitigate information security risks associated with IT
Services and the product supply chain.
Implementation Guidance – For inclusion in supplier agreements on supply chain security, the following topics
should be addressed:
Defining Information security standards to refer to the IT product or service creation, in addition to provider
partnership information security generations;
Requiring suppliers to distribute security specifications across the supply chain for information and
communication technologies services, if suppliers subcontract information and communication technology
services provided to an organization;
Requiring suppliers to spread acceptable security practices through the accessibility chain for information and
communication technology goods, if such goods include purchased items from other suppliers;
Implementation of a monitoring framework and appropriate validation methods that have complied with
specified security criteria for information and communication technology products and services;
Implementation of a monitoring framework and appropriate validation methods that have complied with
specified security criteria for information and communication technology products and services;
Ensuring that essential products can be tracked across the entire supply chain and their origin;
Getting assurance that the IT products supplied function as expected without any unexpected or unwelcome
features;
define rules on information sharing and any problems and compromise between organizations and suppliers
concerning the supply chain;
Information Security Implementation Guide PAGE 104
Implementation of detailed lifecycle and availability and related security risk protocols for the management of
information and communications technologies. This involves handling the uncertainties that components are
no longer available because suppliers no longer work or suppliers no longer supply such components because
of the advancements made in technology.
Supplier Service Delivery Management It’s objective is to maintain, in compliance with supplier agreements,
an agreed level of information security and delivery of service.
Implementation Guidance – Monitoring and review of supplier services will ensure respect for the terms and
conditions of information security of the arrangement and careful monitoring of incidents and issues related
to information security.
This will include a process of service management between the client and the supplier:
A designated entity or service management team should be entrusted with the responsibility for managing
supplier relationships. Moreover, the organization should ensure that suppliers assign responsibilities for
compliance review and implementation of the agreement requirements. There should be appropriate
technical expertise and resources to track compliance with the requirements of the Agreement, especially
with the requirements for information security. If deficiencies in the service delivery are observed, suitable
action should be taken.
To order that sensitive and essential information and information processing facilities that a company has
access, stored or controlled should be kept to full control and exposure of all security aspects. In the context
of a defined reporting procedure, the organization should retain visibility in security activities such as change
management, vulnerability identification, and incident reporting and response to information security.
Control- Change in the provision of services by providers should be managed with the focus on the criticality
of enterprise information, systems, processes, and reassessment of risks and should include maintaining and
improving existing information security policies, procedures, and controls.
Implementation Guidance – This will take into account the following aspects:
Information Security Incident Management in this article explain Management of Information Security
Incidents and Improvements and their Responsibilities & Procedures.
Implementation Guidance- The following recommendations should be taken into account regarding
management roles and procedures for management of incident information security:
A. In order to ensure proper development and coordination of procedures within this organization,
management roles should be established:
– Planning and preparation procedures for incident response;
– Monitoring, identification, analysis and reporting procedures for events and incidents related to information
security;
– Logging procedures for incidents management.
– Forensic Evidence Management Procedures;
– Procedures for information security evaluation and decision making and information security vulnerability
assessment;
Information Security Implementation Guide PAGE 106
– Response protocols include escalation measures, managed recovery from incidents and contact to internal
and external individuals or organizations;
The management objectives for the management of information security incidents should be established to
ensure that those responsible for the management of information security incidents recognize the priorities of
the organization in managing information security incidents.
Control- Information security incidents should be reported as quickly as possible through appropriate
management channels.
Implementation Guidance- Both employees and contractors will be made aware of their responsibility as soon
as possible for reporting security incidents. The reporting protocols and the point of contact at which the
incidents will be reported should also be known to them.
Situation for information security incident documentation to be considered includes:
Ineffective control of security;
Breach of standards regarding quality of information, confidentiality, and availability;
Towards human mistakes;
Failure to comply with policies or guidelines;
Failed to comply with physical safeguards
A device shift controlled;
A program or device malfunctioning;
Infringements of access.
Ignorance and other anomalous device activity may signify a security attack or actual security violation and
therefore should always be identified as a security information event.
Control- Any information security vulnerabilities found or suspected in systems or services in which employees
and contractors are using the information systems and services of the organization should be recorded and
documented.
Implementation Guidance- To avoid accidents related to the protection of information, all employees and
contractors will send these queries to the contact point as soon as possible. The system for reporting should
be as easy, open, and usable as possible.
Other Information- This should be recommended not to attempt to show alleged security vulnerabilities for
employees or contractors. Test deficiencies may be viewed as a possible violation of the system which could
lead to harm to the information system or to the service and to legal responsibility for the individual
conducting the test.
Control- Information security events should be analyzed and determined whether they should be listed as
incidents related to information security.
Implementation Guidance- Each information security event should be evaluated by the contact point on the
agreed security event and classification scale and whether the event should be considered as a security
incident. Incident’s detection and prioritizing can help to assess the nature and severity of an incident.
For situations where the company has an ISIRT (information security incident response team ) , the
assessment and judgment may be forwarded to ISIRT for validation or re-evaluation. Results of the assessment
and decision should be recorded intimately for the aim of future reference and verification.
Control- In the context of the documented procedures, information security incidents should be responded to.
Implementation Guidance- A nominated point of contact and other pertinent people within the organization
or external parties should be able to respond to information security incidents.
Ensuring adequate documentation for subsequent analysis of all responses activities involved;
Communicate to other internal or external entities or organizations who need to know if an information
security incident occurs or any specific details thereof;
Addressing the weaknesses identified for information security or contributing to the incident;
The formal closing and recording of the incident until effectively concluded.
The investigation should be performed after the incident to determine the cause of the accident, if
appropriate.
Control – To minimize the risk or effect of potential accidents, the experience obtained from the study and
mitigation of information security accidents should be used.
Implementation Guidance- Mechanisms will be in place to measure and track the forms, quantities, and costs
of events affecting information security. In order to classify recurring or high impact events, the information
obtained from the information security events assessment should be used.
Other Information- In order to minimize the occurrence, harm and expense of potential accidents, or take
account of the security policy analysis process, assessment of information security accidents that suggest that
improved or additional controls are required (refer 5.1.2).
Facts and figures from real events in the security of information can be used in user awareness training with
due consideration of confidentiality (refer 7.2.2) as examples of how these events may be handled and how to
prevent them in the future.
Collection of Evidence
Control- The organization will define, obtain, procure and retain information as documentation and
implement procedures.
Implementation Guidance- External protocols for treating evidence for administrative and legal action should
be established and tracked.
In general, the processes of defining, gathering, acquiring, and preserving the proof should be in line with
various media types, technologies, and device specifications e.g. based on or off.
Forensic findings can extend beyond the boundaries of association or jurisdiction. In these cases, the
organization should be given the right to collect the required information as forensic proof. In order to
optimize admission opportunities across the qualified jurisdictions, the criteria of the different jurisdictions
should also be considered.
Other Information- The quest for, detection and recording of possible evidence requires identification. The
collection process is the set of physical objects which may contain potential evidence. The method of
acquisition is to create a copy of the data in a given package. Preservation is the mechanism by which
probable evidence is stored and preserved.
This may not be clear if the incident would result in legal proceedings unless an information security issue is
identified first. The risk, therefore, exists that the required proof may be intentionally or inadvertently lost
prior to the seriousness of the incident. Any legal proceedings to be taken and guidance on the facts needed is
recommended to involve lawyer or police at an early age.
Information Security Aspects of Business Continuity Management in this article explain Information Security
Continuity, Planning Information Security Continuity and Implementing Information Security Continuity this
controls.
Implementation Guidance- An organization should assess whether the continuity of security is captured in the
management process of business continuity or in the disaster recovery process. In business continuity
preparation and disaster recuperation, information security standards will be determined.
The Information Security Management should assume that information security requirements remain the
same in unfavorable situations as normal operational conditions without a formal business continuity and
disaster recovery plan. In order to define security criteria related to adverse circumstances, an organization
may also carry out a business effect analysis for information security issues.
Other Information- It is advised to capture the security aspects of information within the standard business
continuity or disaster recovery management business impact analysis to minimize the time and expense of an
external business impact analysis for information security. That means, in business continuity management or
disaster recovery management systems, the criteria for continuity information protection are specifically
formulated.
Information Security Implementation Guide PAGE 110
Adequate management structure is in place with the authority, experience, and competence to plan, mitigate
and respond to disruptive events with the workforce necessary;
Incident response personnel are nominated for incident management and information security with the
necessary responsibility, authority, and competence;
It develops and approves the documented plans, response and recovery procedures detailing how the
organizations manage a disruptive event and maintain their security of information to a pre-set level based on
the information security continuity objectives approved through management.
The organization should establish, record, execute, and maintain the information security continuity
requirements:
Controlling of information security, processes and support systems and equipment, as well as business
continuity or disaster recovery process.
Processes, procedures and changes in implementation in an adverse situation in order to maintain existing
information security controls;
Compensating information security management mechanisms that can not be enforced under adverse
circumstances.
Control- ISO 27001 Annex: A.17.1.3 Verify, Review and Evaluate Information Security Continuity In order to
ensure accurate and productive to adverse circumstances, the company must review on-going controls on
safety information defined and enforced at regular intervals.
Organizations will track the consistency of their management of information security by:
Exercise and test the reliability of systems, procedures, and controls for the protection of information in
compliance with objectives of information continuity;
Exercise and test expertise and routine in the systems, procedures and controls of information security
continuity to ensure that its output is in line with the objectives for information security continuity;
Continuity of information infrastructure, information security mechanisms, policies and controls, and business
continuity management/disaster recovery methods and strategies tests the quality and efficacy of information
security initiatives.
Compliance
Information Security Implementation Guide PAGE 111
Compliance in this article explain Compliance with Legal and Contractual Requirements, Identification of
Applicable Legislation and Contractual Requirements and Intellectual Property Rights this controls.
Implementation Guidance- There must also be identification and documentation of basic controls and
individual obligations to fulfill those criteria.
In order to satisfy the criteria for their business form, administrators should recognize all the legislation that
relates to their organization. If the organization is operating in other countries, managers in all related
countries will ensure compliance.
Implementation Guidance- In order to protect any material regarded as intellectual property, the following
guidelines should be adopted:
Publish a guideline for the legitimate use of software and information products in line with intellectual
property rights;
To purchase software so that copies are not breached, software only from known and reputable sources;
Maintaining awareness and notifying the intention to take disciplinary steps against personnel who violate
intellectual property rights policy;
Maintain adequate registers of assets and identify all assets with intellectual rights protection requirements;
Maintaining evidence and evidence of license ownership, master disks, manuals, etc.;
Implement controls to ensure that no maximum number of approved users is exceeded;
Conduct reviews to check that product and software installed are solely licensed;
Provide a policy for the enforcement of appropriate conditions of license;
Provide an information disposal/transfer of strategy to others;
Compliance with software terms and conditions and public network information;
Not replicate, transform, or extract from commercial (film, audio) recordings, other than those permitted
under the law of copyright;
Books, articles, reports, or other documents not fully or partially copied except as permitted by copyright
legislation.
Protection of Records
Information Security Implementation Guide PAGE 112
Control- ISO 27001 Annex : A.18.1.3 Protection of Records shall, in accordance with the provisions to
legislative, regulatory, contractual, and business requirements, to protect from loss, destruction, falsification,
and unauthorized access and unauthorized release.
Implementation Guidance- The related classification based on the organization’s classification scheme is to be
taken into account when determining whether to secure relevant organizational documents. Categorized
records in the following types of records, such as accounting records, database records, transaction records,
audit logs, and operating procedures, should include details on retention periods and the type of media
permitted for storage, such as paper, microfiche, magnetic, optical. Any associated encryption keys and
programs related to encrypted or digital signatures (see Clause 10) must also be stored so that records are
decrypted for a period of time during which records are kept.
The possibility of media deterioration used for record storage should be taken into consideration. In
accordance with the manufacturer ‘s recommendations, storage and handling procedures should be
implemented.
When electronic storage media are selected, protocols should be developed in order to protect against loss
due to potential technical changes to ensure access for data (either media or format readability) over the
retention period.
Data storage systems should be assigned so that the data required can be recovered, depending on the
requirements to be fulfilled, in a time and format acceptable.
The storage and handling system should, if appropriate, ensure that records and their retention periods are
known as specified in national or regional laws. After that period, if records are not required by the
organization, this system should allow appropriate destruction.
The following steps should be taken by an organization in order to achieve these record safeguarding goals:
Guidelines should be provided with regard to documents and information processing, storage, handling and
disposal;
A schedule for retention of records and the period for which they should be retained should be defined.
An inventory of main information sources should be maintained.
Other Information- Those documents need to be maintained safely to satisfy legislative, regulatory, or
contractual requirements and to maintain key business operations. Examples include documents that might
be necessary to show the legislative or regulatory operation of an entity to protect it from the potential civil or
criminal acts of the public and to clarify to shareholders, external parties, and auditors the financial position of
an organization. The period of time and data content for the retention of information may be determined by
national law or regulation. More information on organizational record management is available in ISO 15489.
Control- Privacy and protection of personal data should be guaranteed, as required, in applicable laws and
regulations.
Implementation Guidance- A data policy of the organization should be developed and implemented to
protect the privacy and personal information identifiable. This policy should be communicated to everyone
involved in personal information processing.
Compliance with this policy and all the relevant legislation and regulations regarding privacy and personal
information protection requires a proper management structure and control. This is often best achieved by
appointing a responsible person like a security officer, who should give management, users and service
providers guidance on their responsibilities and specific procedures. Responsibility should be taken in
compliance with applicable laws and regulations for managing personally identifiable information and
awareness of the information security principles. Suitable technical and organizational measures should be
implemented to protect personal information.
Other Information- In the information and communications technology frameworks, ISO / IEC 29100 offers a
high-level mechanism to safeguard personally identifiable information. Many countries have legislation
introduced to monitor the collection, processing, and transmission of personal information (usually personal
identifiable information on living persons). Such controls could impose duties, depending on the respective
national laws, on those who collect, process, and distribute personally identifiable information and could also
limit the ability to transfer information that can be identified by themselves to other countries.
Control- In accordance with all relevant agreements, legislation, and regulations, cryptographic controls must
be used.
Implementation Guidance- In accordance with the relevant agreements, laws, and regulations, the following
points should be considered:
Restrictions on the import or export of computer hardware and software for the performance of
cryptographic functions;
Restrictions on the import or export of hardware and software designed to have cryptographic functions
applied to it;
Restrictions on the use of encryption;
Mandatory or discretionary methods of access to information encrypted by hardware or software for the
protection of content by the country authorities.
Legal advice will be sought in order to ensure compliance with the applicable laws and regulations. Legal
advice should also be taken before encrypted information or cryptographic checks are transferred across
jurisdictional boundaries.
Protection of Records
Information Security Implementation Guide PAGE 114
Control- ISO 27001 Annex : A.18.1.3 Protection of Records shall, in accordance with the provisions to
legislative, regulatory, contractual, and business requirements, to protect from loss, destruction, falsification,
and unauthorized access and unauthorized release.
Implementation Guidance- The related classification based on the organization’s classification scheme is to be
taken into account when determining whether to secure relevant organizational documents. Categorized
records in the following types of records, such as accounting records, database records, transaction records,
audit logs, and operating procedures, should include details on retention periods and the type of media
permitted for storage, such as paper, microfiche, magnetic, optical. Any associated encryption keys and
programs related to encrypted or digital signatures (see Clause 10) must also be stored so that records are
decrypted for a period of time during which records are kept.
The possibility of media deterioration used for record storage should be taken into consideration. In
accordance with the manufacturer ‘s recommendations, storage and handling procedures should be
implemented.
When electronic storage media are selected, protocols should be developed in order to protect against loss
due to potential technical changes to ensure access for data (either media or format readability) over the
retention period.
Data storage systems should be assigned so that the data required can be recovered, depending on the
requirements to be fulfilled, in a time and format acceptable.
The storage and handling system should, if appropriate, ensure that records and their retention periods are
known as specified in national or regional laws. After that period, if records are not required by the
organization, this system should allow appropriate destruction.
The following steps should be taken by an organization in order to achieve these record safeguarding goals:
Guidelines should be provided with regard to documents and information processing, storage, handling and
disposal;
A schedule for retention of records and the period for which they should be retained should be defined.
An inventory of main information sources should be maintained.
Control- Privacy and protection of personal data should be guaranteed, as required, in applicable laws and
regulations.
Implementation Guidance- A data policy of the organization should be developed and implemented to
protect the privacy and personal information identifiable. This policy should be communicated to everyone
involved in personal information processing.
Compliance with this policy and all the relevant legislation and regulations regarding privacy and personal
information protection requires a proper management structure and control. This is often best achieved by
appointing a responsible person like a security officer, who should give management, users and service
Information Security Implementation Guide PAGE 115
providers guidance on their responsibilities and specific procedures. Responsibility should be taken in
compliance with applicable laws and regulations for managing personally identifiable information and
awareness of the information security principles. Suitable technical and organizational measures should be
implemented to protect personal information.
Control- In accordance with all relevant agreements, legislation, and regulations, cryptographic controls must
be used.
Implementation Guidance- In accordance with the relevant agreements, laws, and regulations, the following
points should be considered:
Restrictions on the import or export of computer hardware and software for the performance of
cryptographic functions;
Restrictions on the import or export of hardware and software designed to have cryptographic functions
applied to it;
Restrictions on the use of encryption;
Mandatory or discretionary methods of access to information encrypted by hardware or software for the
protection of content by the country authorities.
Legal advice will be sought in order to ensure compliance with the applicable laws and regulations. Legal
advice should also be taken before encrypted information or cryptographic checks are transferred across
jurisdictional boundaries.
Its objective is to ensure that information security is enforced and managed in compliance with organizational
policies and procedures.
Control- A proposed or major improvement should be taken into account internally for the organization’s
approach to information security management and execution, (i.e. control objectives, controls, policies,
processes, and procedures for information security).
Implementation Guidance
The independent review will be conducted by the board. Such an independent review is required to ensure
that the organization ‘s approach to information security management remains consistent, appropriate, and
efficient. The analysis will include an assessment of improvement opportunities and the need to change the
security approach, including policy and control objectives. Such a review would need to be conducted by
people independently of the area being reviewed, e.g., an internal audit function, an independent manager, or
a specialized external party organization. Those who conduct these reviews should have the skills and
experience needed. The independent review results must be recorded and reported to the management
responsible for initiating the review. These records are to be maintained. When, for example, the defined aims
and objectives and needs of the company are not met in compliance with the guiding principle for security of
Information Security Implementation Guide PAGE 116
information as set out in the information security policy (Refer 5.1.1), management should pursue corrective
measures.
Other Information
In addition, the guidance on carrying out an independent review is provided by ISO/27007, the Guidelines on
Information Security Management Systems Auditing and ISO / IEC TR 27008 Guidelines for Auditors on
Information security controls.
Information security clauses and their implementation, i.e., controls which should be implemented by the
organization to preserve the CIA triad, Confidentiality, Integrity, and Availability to maintain their critical,
sensitive information in a secure manner it will help you to understand and recognize the full scope of your
organization’s security checks to protect your organization’s activities and information equipment (assets)
from attacks, and ensure privacy and also ensure that information-security is enforced and managed in
compliance with organizational policies and procedures.
Control
Managers will review on a regular basis compliance with relevant security policies, guidelines, and other
security specifications of information processing and procedures within their field of responsibility.
Implementation Guidance
Managers will determine how information security criteria identified in policies, standards, and other
regulations are to be assessed. For efficient routine analysis, automated measuring and reporting tools should
be considered.
If any failure to comply results from the review are detected, managers should: -
Also Read: ISO 27001 Annex: A.18.1.3 Protection of Records, A.18.1.4 Privacy and Protection of Personally
Identifiable Information and A.18.1.5 Regulation of Cryptographic Controls
Other Information
Information Security Implementation Guide PAGE 117
Control
Information systems for compliance with the Information Security Policies and practices of an organization
should be periodically reviewed.
Implementation Guidance