+ All Categories
Home > Documents > ISO 27001 Information Security Management Systems (ISMS...

ISO 27001 Information Security Management Systems (ISMS...

Date post: 07-Feb-2018
Category:
Upload: dodan
View: 258 times
Download: 7 times
Share this document with a friend
40
1 © SecuraStar, LLC. 2012 1 ISO 27001 Information Security Management Systems (ISMS) ISSA PHOENIX January 8, 2013
Transcript
Page 1: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

1 © SecuraStar, LLC. 2012 1

ISO 27001 Information Security Management Systems (ISMS)

ISSA PHOENIX January 8, 2013

Page 2: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

2 © SecuraStar, LLC. 2012 2

AGENDA

What is ISO 27001? 2

Define the Scope 3

What is Information Security? 1

Risk Management 4

Page 3: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

3 © SecuraStar, LLC. 2012 3

What is Information Security?

What is Information Security? 1

Page 4: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

4 © SecuraStar, LLC. 2012 4

Question:

What is the most important asset in your organization?

INFORMATION

What is Information Security? 1

Page 5: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

5 © SecuraStar, LLC. 2012 5

What is Information?

Information is an “Asset”, that like any other important business asset, that

has a critical value to the organization and thus needs to be adequately

protected.

Information can exist in “ANY” form:

• Electronic – email, data stored, websites, etc.

• Physical – paper files, cd, photos, USB drive, etc.

• Verbal – phone conversations, in-person conversations, meetings,

Knowledge – employee knowledge (in their heads)

• Other?

What is Information Security? 1

Page 6: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

6 © SecuraStar, LLC. 2012 6

Information has 3 main attributes:

Confidentiality

The property that information is not made available or disclosed to unauthorized individuals, entities, or processes

Integrity

The property of safeguarding the accuracy and completeness of assets

Availability

The property of being accessible and usable upon demand by an authorized entity

*The importance of each component varies from organization to organization!

What is Information Security? 1

Page 7: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

7 © SecuraStar, LLC. 2012 7

How do we define Information Security?

“The preservation of confidentiality, integrity and availability (CIA) of information

in any form.”

In addition, other properties such as authenticity, accountability, non-repudiation

and reliability may also be involved.

[ISO/IEC 27002:2005]

What is Information Security? 1

Page 8: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

8 © SecuraStar, LLC. 2012 8

Information security management is a management process NOT a

technical process!

It’s all about managing

• People

• Processes

• Assets

• Risks

• ...

From an information security management perspective, technology is

a control (anti-vírus, firewalls, IPS, etc.) we put in place to mitigate

risk, .....not the opposite!

What is Information Security? 1

Page 9: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

9 © SecuraStar, LLC. 2012 9

Practicing information security is often an unorganized, reactive and a bottom

up approach.

Practicing Information Security (Reactive):

• No Management Commitment

• No information asset inventory

• No risk assessment

• No way to evaluate or prioritize risk

• No way to evaluate if controls are adequate

• No metrics

• No improvement

• Compliance???

What is Information Security? 1

Page 10: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

10 © SecuraStar, LLC. 2012 10

Managing information security is an organized, proactive and top down

process approach!

Managing Information Security (Proactive):

• Requires Management Commitment

• Defined Scope and boundaries of the ISMS

• Information asset inventory

• Risk assessment

• Selection of controls based on risk / Prioritization

• Metrics to monitor control maturity

• Continuous improvement cycle

• Measured Compliance

• Reasonable Assurance to Interested Parties (stakeholders)

What is Information Security? 1

Page 11: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

11 © SecuraStar, LLC. 2012 11

What is ISO 27001?

What is ISO 27001? 2

Page 12: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

12 © SecuraStar, LLC. 2012 12

Management Systems “A management system is the framework of processes and procedures used to ensure that an

organization can fulfill all tasks required to achieve its objectives.”

ISO Guide 72

• ISO 9001 – Quality Management System (QMS)

• ISO 14001 – Environmental Management System (EMS)

• ISO 20000 – IT Services Management System (ITSMS)

• ISO 27001 – Information Security Management System (ISMS)

• ISO 22301 – Business Continuity Management System (BCMS)

• ISO 22000 – Food Safety Management System

• OHSAS 18001 – Health & Safety Management System

• Others

What is ISO 27001? 2

Page 13: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

13 © SecuraStar, LLC. 2012 13

PLAN – Establish, assess, define

DO – Implement, operate, produce

CHECK – Audit, measure, monitoring

ACT – Improve, correct, prevent

PDCA model (Dr. W. Edwards Deming)

All ISO management systems are based on the PDCA continuous

improvement cycle methodology

Key concept – Continuous improvement =

What is ISO 27001? 2

Page 14: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

14 © SecuraStar, LLC. 2012 14

ISO 27001 is a standard (set of requirements) to establish, implement, operate,

monitor, review, maintain and improve a documented Information Security

Management System (ISMS) within the context of the organization's Risk to its

Information Assets (information in “Any” form).

The ISMS is designed to ensure the selection of

adequate and proportionate security controls, that

protect information assets and give confidence to

interested parties (reasonable assurance).

What is ISO 27001? 2

Page 15: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

15 © SecuraStar, LLC. 2012 15

SECTION 4 Information Security Management System

(ISMS)

4.1 General Requirements

4.2 Establishing and Managing the ISMS

4.2.1 Establish the ISMS = PLAN

4.2.2 Implement and Operate the ISMS = DO

4.2.3 Monitor and Review the ISMS = CHECK

4.2.4 Maintain and Improve the ISMS = ACT

4.3 Documentation Requirements

4.3.1 General

4.3.2 Control of Documents

4.3.3 Control of Records

SECTION 5 Management Responsibility

5.1 Management Commitment

5.2 Resource Management

5.2.1 Provision of Resources

5.2.2 Training, Awareness and Competence

SECTION 6 Internal ISMS Audits

SECTION 7 Management Review of the ISMS

7.1 General

7.2 Review Input

7.3 Review Output

SECTION 8 ISMS Improvement

8.1 Continual Improvement

8.2 Corrective Action

8.3 Preventive Action

Section 4-8

Auditable Requirements

Quality based management requirements

(auditable) that “shall” be met by an

Information Security Management

System (ISMS) used to manage the

information security program.

What is ISO 27001? 2

Page 16: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

16 © SecuraStar, LLC. 2012 16

Annex A – 11 Control Objectives / 133 Controls

A comprehensive minimum baseline of information security controls that all

information security programs must consider when selecting controls to mitigate

risks (Risk Management).

# Ref Description

1 A5 Security policy

2 A6 Organization of information security

3 A7 Asset management

4 A8 Human resources security

5 A9 Physical and environmental security

6 A10 Communications & operations management

7 A11 Access control

8 A12 Information systems acquisition, development & maintenance

9 A13 Information security incident management

10 A14 Business continuity management

11 A15 Compliance

What is ISO 27001? 2

Page 17: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

17 © SecuraStar, LLC. 2012 17

“The requirements in ISO 27001 auditable sections 4-8 are generic and

are intended to be applicable to all organizations, regardless of type, size

and nature.”

GENERIC REQUIREMENTS?...........

Then how do you implement ISO 27001?

&

What does ISO 27001 Framework look like?

What is ISO 27001? 2

Page 18: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

18 © SecuraStar, LLC. 2012 18

What is ISO 27001? 2

5 Step

Process Flow MANAGEMENT COMMITMENT

ACT

PLAN

ASSET

INVENTORY

ISMS

IMPROVEMENTS

DO RISK

TREATMENT

PLAN

CONTROL

IMPLEMENTATION

SECURITY

SPECIFICATIONS

PROCESSES &

PROCEDURES

OPERATIONAL

CONTROLS

CHECK

PREVENTIVE

ACTION PLAN

TRAINING &

AWARENESSINCIDENT

MANAGEMENT

MONITORINGMETRICS

EVENT

DETECTION

ISMS

EFFECTIVENESS

REVIEW

INTERNAL

AUDITS

EXTERNAL

AUDITS

MANAGEMENT

REVIEW

CORRECTIVE

ACTION PLAN

ISO 27001

ISMS FRAMEWORK

© SecuraStar, Inc. 2012

REPRODUCTION PROHIBITED

DEFINE

SCOPE &

BOUNDARIES

INFORMATION

SECURITY

POLICY

INFORMATION

SECURITY

GOVERNANCE

INFORMATION

SECURITY

POLICIES

ISM

S

DIA

GR

AM

RISK

ASSESSMENT

STATEMENT

OF

APPLICABILITY

RISK

TREATMENT

OPTIONS

CONTROL

SELECTION

RISK MANAGEMENT WORKBOOK

ISO 27001

FRAMEWORK

LEGAL,

REGULATORY &

CONTRACTUAL

REQUIREMENTS

RISK

ASSESSMENT

METHODOLGY

Page 19: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

19 © SecuraStar, LLC. 2012 19

1. Obtain Management Commitment

What is ISO 27001? 2

Page 20: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

20 © SecuraStar, LLC. 2012 20

2. Establish the ISMS = PLAN

What is ISO 27001? 2

Page 21: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

21 © SecuraStar, LLC. 2012 21

3. Implement & Operate the ISMS = DO

DO RISK

TREATMENT

PLAN

CONTROL

IMPLEMENTATION

SECURITY

SPECIFICATIONS

PROCESSES &

PROCEDURES

OPERATIONAL

CONTROLS

TRAINING &

AWARENESS

INFORMATION

SECURITY

POLICIESIS

MS

DIA

GR

AM

What is ISO 27001? 2

Page 22: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

22 © SecuraStar, LLC. 2012 22

REPRODUCTION PROHIBITED

4. Monitor and Review the ISMS = CHECK

CHECK

INCIDENT

MANAGEMENT

MONITORINGMETRICS

EVENT

DETECTION

ISMS

EFFECTIVENESS

REVIEW

INTERNAL

AUDITS

EXTERNAL

AUDITS

MANAGEMENT

REVIEW

What is ISO 27001? 2

Page 23: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

23 © SecuraStar, LLC. 2012 23

5. Maintain and Improve the ISMS = ACT

ACT

ISMS

IMPROVEMENTS

PREVENTIVE

ACTION PLAN

CORRECTIVE

ACTION PLAN

What is ISO 27001? 2

Page 24: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

24 © SecuraStar, LLC. 2012 24

PLAN

Define the Scope

Define the Scope 3

Page 25: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

25 © SecuraStar, LLC. 2012 25

Define the Scope & boundaries

• The scope definition is the most important step in the whole process.

• The scope will have a huge impact on the rest of the implementation

project, including costs and effort.

• It should meet business requirements and add value to products

and/or services.

• So make sure you choose carefully!

The SCOPE is always a business decision!!!

Define the Scope 3

Page 26: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

26 © SecuraStar, LLC. 2012 26

Define the Scope & boundaries Along with the scope one must define its boundaries, i.e. third parties

and respective connections

ISMS

Scope HR

Software

Development

Legal

IT

Facilities

Quality

Audit

Others

Customers

Partners

Providers

Consultants

Third parties

Contractors Vendors

Organization

Define the Scope 3

Page 27: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

27 © SecuraStar, LLC. 2012 27

Scope and Boundaries of the ISMS

Describe what is In Scope:

The <Organization> ISMS scope of registration includes all systems,

networks, facilities and personnel that support the <Business

Process>.

Describe what is not in Scope:

The <Organization> ISMS scope of registration does not include any

systems, networks, facilities and people that support any other

remaining business processes within <Organization>.

Define the Scope 3

Page 28: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

28 © SecuraStar, LLC. 2012 28

Now we can create an Information Asset Inventory

Define all information related assets within the Scope including:

• Information

• People

• Facilities

• Hardware / software / applications

• Other assets?

Define the Scope 3

Page 29: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

29 © SecuraStar, LLC. 2012 29

Asset Inventory (within scope)

Type Category Asset Owner Location Processes

Hardware

Servers

Web servers

Manager

Los Angeles

DC / Frankfurt

DC

P1

Application servers

File share/backups

servers

Database servers

Desktops 22 desktops

Employees Headquarters;

Frankfurt office P1, P2

Laptops 22 laptops

Mobile computings

(tablets,

smartphones, etc.)

22 smartphones; 2

tablets (Name and

Name)

Printers/copiers Office printers Manager Headquarters

Define the Scope 3

Page 30: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

30 © SecuraStar, LLC. 2012 30

PLAN

Risk Management

Risk Management 4

Page 31: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

31 © SecuraStar, LLC. 2012 31

Risk Management 4

The Risk Management Process

Page 32: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

32 © SecuraStar, LLC. 2012 32

Methodology

• Any methodology can be used;

• Shall ensure that risk assessments produce comparable and

reproducible results;

• It must be used in all risk assessment processes within the

organization (scope);

• Usage of software tools it s optional

Risk Management 4

Page 33: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

33 © SecuraStar, LLC. 2012 33

Risk Assessment process

Risk = Impact x Likelihood

• Impact

The consequences to the organization that a certain situation occurs

Financial impact

Image/credibility impact

Legal/Regulatory impact

Other impacts to the organization according to business

requirements

• Likelihood

The existing probability of a threat to explore a certain vulnerability

Threat

Vulnerability

Risk Management 4

Page 34: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

34 © SecuraStar, LLC. 2012 34

Example of Impact & Likelihood Scales

IMPACT DESCRIPTION

1 The harm to the Organization is VERY LOW

2 The harm to the Organization is LOW

3 The harm to the Organization is MEDIUM

4 The harm to the Organization is HIGH

5 The harm to the Organization is CRITICAL

LIKELIHOOD DESCRIPTION

1 The probability of such event is VERY LOW

2 The probability of such event is LOW

3 The probability of such event is MEDIUM

4 The probability of such event is HIGH

5 The probability of such event is CRITICAL

Risk Management 4

Page 35: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

35 © SecuraStar, LLC. 2012 35

EXAMPLE: Risk Assessment Matrix based on 1-5 impact and likelihood scales.

CATEGORY RANGE

LOW RISK <=5

MEDIUM RISK >5 <20

HIGH RISK => 20

Sample: “This organization accepts current risks rated less than or

equal to 5 on the impact and likelihood risk matrix”

RISK

IMPACT 1 2 3 4 5

1 1 2 3 4 5

2 2 4 6 8 10

3 3 6 9 12 15

4 4 8 12 16 20

5 5 10 15 20 25

LIKELIHOOD

Risk Management 4

Page 36: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

36 © SecuraStar, LLC. 2012 36

There are 4 options for risk treatment:

• Acceptance Accept the risk based on business decision

• Mitigation

Select the controls to mitigate the risk

• Transfer Outsource a process Insurance Policy

• Terminate

Terminate the process

Risk Treatment Options

Risk Management 4

Page 37: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

37 © SecuraStar, LLC. 2012 37

Control Selection

• Select control objectives and controls for the treatment of risks

(Annex A – 133 Controls).

• Control objectives and controls shall be selected and implemented to

meet the requirements identified by the risk assessment and risk

treatment process.

• This selection shall take account of the criteria for accepting risks

(see 4.2.1c)) as well as legal, regulatory and contractual

requirements.

Risk Management 4

Page 38: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

38 © SecuraStar, LLC. 2012 38

Risk Treatment Plan (RTP)

• One of the required documents in ISO 27001

• Output from the Risk Assessment

• The RTP is the Control Implementation Project Plan

o Control to implement

o Objective/s to achieve

o Responsible for the task

o Resources

o Dates (planned, real)

o Status

Risk Management 4

Page 39: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

39 © SecuraStar, LLC. 2012 39

2. Establish the ISMS = PLAN

Risk Management 4

Page 40: ISO 27001 Information Security Management Systems (ISMS ...phoenix.issa.org/.../uploads/2012/12/2013-Q1-SecuraStar_ISO_27001.pdf · ISO 27001 Information Security Management Systems

40 © SecuraStar, LLC. 2012 40

THANK YOU!

Paulo Porfirio

Managing Partner Europe

Director of Service Delivery

Direct 651-253-3612

[email protected]

Dave Anders

CEO

Managing Partner (Worldwide)

Direct 612-703-1903

[email protected]

www.SecuraStar.com


Recommended