18
7/31/2019 Iso 27001 Training http://slidepdf.com/reader/full/iso-27001-training 1/18 ISO/IEC 27001:2005

Iso 27001 Training

  • Upload
    anoopcp

  • View
    271

  • Download
    3

Embed Size (px)

Citation preview

Page 1: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 1/18

ISO/IEC 27001:2005

Page 2: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 2/18

Real World Scenario (PersonalProspective)

Imagine that you are at a restaurant and after 

finishing your meal, you hand-over your credit card to the waiter. The waiter takes the

card and returns it after charging the card.

The whole process takes about 5 to 10

minutes. Have you ever asked yourself whether there is a possibility that the card

could be misused during this time?

Page 3: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 3/18

 Another example of information produced by

the business is “Business Intelligence” that isused for forecasting as well as for producing

new services and products. Disclosure of this

information may lead to loss of competitive

advantage and subsequent loss of revenueand jobs.

Importance of Business Information

Page 4: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 4/18

Importance of Business Information

Similarly source code and new product

designs are valuable information thatenables the business to produce new

products and to become leaders in their 

specific market segment. Disclosure of this

information could lead to loss of competitiveadvantage, loss of market share and

revenue.

Page 5: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 5/18

ISMS and ISO 27001

ISMS or Information Security Management

System.

“An ISMS is a management framework for 

identifying important information,

continuously evaluating security risks to thisimportant information and taking reasonable

steps to protect this important information.”

Page 6: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 6/18

An ISMS is a continuous process

 An ISMS is a continuous process and lasts

throughout the life of the business.

Page 7: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 7/18

PDCA Model

P-D-C-A model is also called the Dr. W.

Edwards Deming

Page 8: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 8/18

ISO 27001 adheres to the PDCA model

and is in all probability the most widelyused standard for ISMS implementation in

the world.

PDCA is the most widely used modelin the world

Page 9: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 9/18

Now, what is ISO 27001? And, what is

the relationship between an ISMS andISO 27001?

ISO 27001 is an international standard that

provides a model for establishing,implementing, operating, monitoring,

reviewing, maintaining and improving an

ISMS.

To keep it simple, you will use ISO 27001

to create and manage your ISMS.

Page 10: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 10/18

In the PLAN phase, you will focus onestablishing the ISMS

1. Defining the Scope of the ISMS

2. Defining the ISMS Policy 3. Defining the Risk Assessment Approach of the organization

4. Identifying the risks

5. Analyzing risk treatment options

6. Selecting control objectives and controls for treatment of risks

7. Obtaining Management approval and authorization for risktreatment and residual risks

8. Preparing “Statement of Applicability”

Page 11: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 11/18

In the DO phase, we will focus onimplementing and operating the ISMS.

1. Defining and implementing a Risk Treatment

Plan 2. Selecting appropriate controls

3. Defining how to measure the effectiveness of 

the controls

4. Implementing training and awareness programs 5. Managing the operation of the ISMS

6. Managing the resources for operating the ISMS

7. Implementing security incident detection and

response procedures

Page 12: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 12/18

Next, we focus on the CHECK phase

1. Executing monitoring and reviewing procedures

2. Measuring the effectiveness of controls 3. Reviewing risk assessments and reviewing

residual risks

4. Conducting internal ISMS audits

5. Undertaking management review of the ISMS

6. Updating security plans based on review andfindings

7. Recording actions and events that may have animpact on the performance of the ISMS

Page 13: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 13/18

We come to the ACT phase, which

focuses on maintaining and improvingthe ISMS

1. Implement the identified improvements

in the ISMS 2. Taking appropriate corrective and

preventive actions

3. Communicate the actions and

improvements to all relevant parties

4. Ensure that the improvements achieve

their intended objectives

Page 14: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 14/18

Page 15: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 15/18

ISO 27001 Structure

Mandatory Requirements-parts 4, 5, 6, 7 and

8.  Annex A-that has 133 controls grouped into

11 domains

Page 16: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 16/18

For Learning purpose let us divide ISO27001 into 2 sections

Section 1 consists of a set of mandatoryrequirements, that explains how to build the ISMS in

the PDCA Model. Section 2 consists of Control Objectives and

Controls. In the ISO 27001 standard this is Annex A.“Controls” are essentially “information securitysafeguards”. For example, an “anti-virus” is a control,an “information Security training program” is acontrol, or a “change management process” is acontrol. “Control Objectives” specify the aim for usinga control or a set of controls

ISO 27001 provides a set of 133 controls that youcan use to build your ISMS.

Page 17: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 17/18

ISO 27001 Structure

There is a very simple relationship between

Section 1 and Section 2. Section 1, tells youhow to build the ISMS and Section 2 gives

you a set of controls that you can use to build

the ISMS.

Page 18: Iso 27001 Training

7/31/2019 Iso 27001 Training

http://slidepdf.com/reader/full/iso-27001-training 18/18

Let us look at an examples that explain therelationship between Section 1 and Section 2.

If you read through the standard, you will see

the “Part 4.2 - Define an ISMS policy in termsof the characteristics of the business, ….”..

Now, if you are looking at some more

information on how to go about this, you can

use the control in Section 2, which is “Annex A - A.5.1 Information Security policy

document”.