SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Introduction to ISO/IEC
              27000

ISO (the International Organization for Standardization) and IEC
   (the International Electrotechnical Commission) form the
       specialized system for worldwide standardization

                              by
                Sudhanwa Jogalekar
Sudhanwa Jogalekar
• Qualifications: BE, DBM, MCM, (Dip cyberlaw)
• Professional certification: ISO 27001 Lead
  Auditor
• Professional experience : 25 years
• Academic experience: Syllabus design, paper
  setting, assessments, QIP, teachers training
  programs, visiting faculty etc. for Pune, Symbiosis
  University
• FOSS evangelist. Promoting FOSS for 10 years.
  Conduct FOSS workshops, seminars, training
  programs, conferences etc.
Various Standards
• ISO 9000 (QMS)

• ISO 14000 (EMS)

• ISO 27000 (ISMS)

• ISO 20000 (IT SMS)
ISO 27000 family
•   ISO/IEC 27001 formal ISMS specification
•   ISO/IEC 27002 infosec controls guide
•   ISO/IEC 27003 implementation guide
•   ISO/IEC 27004 infosec metrics
•   ISO/IEC 27005 infosec risk management
•   ISO/IEC 27006 ISMS certification guide
•   ISO/IEC 27011 ISO27k for telecomms
•   ISO/IEC 27033-1 network security
•   ISO 27799 ISO27k for healthcare
ISO 27000 Basics
Why ISO 27001?
●   ISO/IEC 27001 is an investment in the company’s future

●   A “risk based” management system to help organisations plan and
    implement an information security management system (ISMS),assists
    organisations by providing a structured and a proactive approach to
    information security, by making sure the right people, processes,
    procedures and technology are in place to protect information assets.

●   Help minimise possible harm to organisations that can be caused by
    deliberate or accidental acts.
Why ISO 27001?
●   Framework that will take account of all legal and regulatory requirements.

●   Gives the ability to demonstrate and independently assure the internal
    controls of a company (corporate governance)

●   Proves senior management commitment to the security of business and
    customer information

●   Helps provide a competitive edge to the company

●   Reduces the amount of time and effort when audited by internal compliance
    reviews or external audits

●   Easier to obtain funding and resources for information security team and
    security objectives
Why certification?
●   Provides a goal, which will help facilitate the implementation of an
    information security management system and security controls

●   Formalizes, and independently verifies, Information Security
    processes, procedures and documentation

●   Independently verifies that risks to the company are properly
    identified and managed

●   Help identify and meet contractual and regulatory requirements

●   Demonstrates to customers that security of their information is
    taken seriously
Certification
●   Standard

●   Policies

●   Regulations

●   Mandatory

●   Best practices
Certification
●   Management Support

●   Staff support

●   Technical support

●   Vendor support – SLA, NDA

●   Best practices
Information Security
                                  V/S
                         IT Security
●   User desktops
●   Manager laptops
●   Servers
●   LAN, WAN
●   Server room A/C
●   Company bus/car drivers
●   Security guard at reception
●   Routers
●   Fire extinguishers
●   Canteen
●   Software licenses
ISMS and Asset Management
ISMS is “Management assurance mechanism for security of
business information assets from potential security breach.”

It relates to all types of information, be it paper based or electronic.

Secure information is one that ensures Confidentiality, Integrity
and Availability.

Confidentiality: ensuring that information can only be
accessed by those with the proper authorization
Integrity: safeguarding the accuracy and completeness of
information and the ways in which it is processed
Availability: ensuring that authorized users have access to
information and associated assets when required
ISMS and Asset Management
“Information is an asset that, like other important business assets, is
essential to an organization’s business and consequently needs to be
suitably protected.”


Asset is something that has “value”.

Information assets of an organization:
Business data, Employee information, Research records
Price lists, Tender documents

Organization must determine which assets can materially affect the
delivery of product/service by their absence or degradation
Information Security…
      “Information Security is about protecting
    Information through selection of appropriate
                Security Controls”.
                                                       Processed
                    Paper                              Stored
                    based,        ISMS determines
Information                                          Transferred
                  Electronic,     how information is
                      etc                              Archived
                                                       Destroyed

                                Ensuring C, I, A for
                                secure information

 To protect information assets from potential security breach
Assets and RA/RTP
●   Risk Assessment

●   Risk Treatment Plan

●   Continuous Improvement

●   PDCA

●   Audit process
ISO 27001 standard
•   Clause 4: Information Security Management System
•   Clause 5: Management Responsibility
•   Clause 6: Internal ISMS Audit
•   Clause 7: Management Review of the ISMS
•   Clause 8: ISMS Improvement
•   Annexure A: Domain, Control Objective & Controls

        11 Domains

                           39 Control
    Specifies              Objectives                  Satisfies
    Requirements                                       Objectives
                         133 Controls
Introduction to ISO/IEC
         27000


    ??? Questions ???

            Coming up
    Part II (Implementation)

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPrivacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
 

Ähnlich wie ISO 27001

Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
Muhammad Mudassar
 
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptxChapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
kevlekalakala
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Tammy Clark
 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business Value
HyTrust
 

Ähnlich wie ISO 27001 (20)

Information security
Information securityInformation security
Information security
 
Know more about exin unique information security program
Know more about exin unique information security programKnow more about exin unique information security program
Know more about exin unique information security program
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Cyber Security Management
Cyber Security ManagementCyber Security Management
Cyber Security Management
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
vsRisk - features and benefits.ppt
vsRisk - features and benefits.pptvsRisk - features and benefits.ppt
vsRisk - features and benefits.ppt
 
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptxChapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security Professional
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
 
G12: Implementation to Business Value
G12: Implementation to Business ValueG12: Implementation to Business Value
G12: Implementation to Business Value
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 

Mehr von n|u - The Open Security Community

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

ISO 27001

  • 1. Introduction to ISO/IEC 27000 ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization by Sudhanwa Jogalekar
  • 2. Sudhanwa Jogalekar • Qualifications: BE, DBM, MCM, (Dip cyberlaw) • Professional certification: ISO 27001 Lead Auditor • Professional experience : 25 years • Academic experience: Syllabus design, paper setting, assessments, QIP, teachers training programs, visiting faculty etc. for Pune, Symbiosis University • FOSS evangelist. Promoting FOSS for 10 years. Conduct FOSS workshops, seminars, training programs, conferences etc.
  • 3. Various Standards • ISO 9000 (QMS) • ISO 14000 (EMS) • ISO 27000 (ISMS) • ISO 20000 (IT SMS)
  • 4. ISO 27000 family • ISO/IEC 27001 formal ISMS specification • ISO/IEC 27002 infosec controls guide • ISO/IEC 27003 implementation guide • ISO/IEC 27004 infosec metrics • ISO/IEC 27005 infosec risk management • ISO/IEC 27006 ISMS certification guide • ISO/IEC 27011 ISO27k for telecomms • ISO/IEC 27033-1 network security • ISO 27799 ISO27k for healthcare
  • 6. Why ISO 27001? ● ISO/IEC 27001 is an investment in the company’s future ● A “risk based” management system to help organisations plan and implement an information security management system (ISMS),assists organisations by providing a structured and a proactive approach to information security, by making sure the right people, processes, procedures and technology are in place to protect information assets. ● Help minimise possible harm to organisations that can be caused by deliberate or accidental acts.
  • 7. Why ISO 27001? ● Framework that will take account of all legal and regulatory requirements. ● Gives the ability to demonstrate and independently assure the internal controls of a company (corporate governance) ● Proves senior management commitment to the security of business and customer information ● Helps provide a competitive edge to the company ● Reduces the amount of time and effort when audited by internal compliance reviews or external audits ● Easier to obtain funding and resources for information security team and security objectives
  • 8. Why certification? ● Provides a goal, which will help facilitate the implementation of an information security management system and security controls ● Formalizes, and independently verifies, Information Security processes, procedures and documentation ● Independently verifies that risks to the company are properly identified and managed ● Help identify and meet contractual and regulatory requirements ● Demonstrates to customers that security of their information is taken seriously
  • 9. Certification ● Standard ● Policies ● Regulations ● Mandatory ● Best practices
  • 10. Certification ● Management Support ● Staff support ● Technical support ● Vendor support – SLA, NDA ● Best practices
  • 11. Information Security V/S IT Security ● User desktops ● Manager laptops ● Servers ● LAN, WAN ● Server room A/C ● Company bus/car drivers ● Security guard at reception ● Routers ● Fire extinguishers ● Canteen ● Software licenses
  • 12. ISMS and Asset Management ISMS is “Management assurance mechanism for security of business information assets from potential security breach.” It relates to all types of information, be it paper based or electronic. Secure information is one that ensures Confidentiality, Integrity and Availability. Confidentiality: ensuring that information can only be accessed by those with the proper authorization Integrity: safeguarding the accuracy and completeness of information and the ways in which it is processed Availability: ensuring that authorized users have access to information and associated assets when required
  • 13. ISMS and Asset Management “Information is an asset that, like other important business assets, is essential to an organization’s business and consequently needs to be suitably protected.” Asset is something that has “value”. Information assets of an organization: Business data, Employee information, Research records Price lists, Tender documents Organization must determine which assets can materially affect the delivery of product/service by their absence or degradation
  • 14. Information Security… “Information Security is about protecting Information through selection of appropriate Security Controls”. Processed Paper Stored based, ISMS determines Information Transferred Electronic, how information is etc Archived Destroyed Ensuring C, I, A for secure information To protect information assets from potential security breach
  • 15. Assets and RA/RTP ● Risk Assessment ● Risk Treatment Plan ● Continuous Improvement ● PDCA ● Audit process
  • 16. ISO 27001 standard • Clause 4: Information Security Management System • Clause 5: Management Responsibility • Clause 6: Internal ISMS Audit • Clause 7: Management Review of the ISMS • Clause 8: ISMS Improvement • Annexure A: Domain, Control Objective & Controls 11 Domains 39 Control Specifies Objectives Satisfies Requirements Objectives 133 Controls
  • 17. Introduction to ISO/IEC 27000 ??? Questions ??? Coming up Part II (Implementation)