SlideShare ist ein Scribd-Unternehmen logo
1 von 15
iFour ConsultancyClause 6.1.3 & Clause 6.2
 Risk management process
 Clause 6.1.3 : Risk treatment process
 Risk treatment strategies
 Clause 6.2 : Information security objectives
 References
Contents
Custom eCommerce Developers
http://www.ifourtechnolab.com
Risk management process
Custom eCommerce Developers
http://www.ifourtechnolab.com
Clause 6.1.3 Information Security Risk Treatment
Organization should define and apply an information security risk treatment
process, implementation and operation.
Responds to risks evaluated in Clause 6.1.2(e) i.e. evaluation of information
security risks of ISO 27001:2013.
Documents all information related to this risk treatment process as
Risk Treatment Plan (RTP).
Custom eCommerce Developers
http://www.ifourtechnolab.com
 Select appropriate information security risk treatment options by taking account of
the risk assessment results
 Determine all controls that are necessary to implement the information security
risk treatment options chosen above
 Compare the controls determined in above step with those in Annexure A of
ISO 27001:2013
 Verify that no necessary controls have been omitted
Risk treatment process
Custom eCommerce Developers
http://www.ifourtechnolab.com
Risk treatment process (Continued)
 Produce a Statement Of Applicability(SoA) that contains the necessary
controls and justification for inclusions
Assess whether necessary controls listed in Annexure A of ISO 27001:2013 are
implemented or not
Provide justification for exclusions of controls from Annexure A of ISO
27001:2013
Formulate information security risk treatment plan (RTP)
Obtain risk owner’s approval of RTP and acceptance of the residual
information security risks
Custom eCommerce Developers
http://www.ifourtechnolab.com
 Risks can be treated in four ways:
 Risk Acceptance
 Risk Reduction
 Risk Transference
 Risk Avoidance
Risk Treatment Strategies
Custom eCommerce Developers
http://www.ifourtechnolab.com
 Risk Acceptance:
Risks are acceptable with current controls
 Risk Reduction:
Risks are reduced by implementing additional controls
 Risk Avoidance:
Risks can not be reduced with current controls and risks are not accepted
 Risk Transference:
Risks are transferred to other third parties
Risk Treatment Options
Custom eCommerce Developers
http://www.ifourtechnolab.com
Documented Information for Clause 6.1.3
Organization should retain documented information about the information
security risk treatment process.
Information about risk treatment process is documented in two ways:
 Risk Treatment Plan
 Statement of Applicability
Custom eCommerce Developers
http://www.ifourtechnolab.com
Organization shall establish information security objectives at relevant
functions and levels.
Information security objectives primarily concerns with:
Confidentiality
Integrity
Availability
Clause 6.2 : Information Security Objectives
Confidentiality Integrity
Availability
Custom eCommerce Developers
http://www.ifourtechnolab.com
 Be consistent with information security policy
 Be measurable
 Be communicated
 Be updated as appropriate
 Take into account applicable information security requirements and results from
risk assessment and risk treatment
Information Security Objectives Characteristics
Custom eCommerce Developers
http://www.ifourtechnolab.com
 Organization shall determine following information to achieve information security
objectives:
What will be done
What resources will be required
Who will be responsible
When it will be completed
How the results will be evaluated
Information Security Objectives Requirements
Custom eCommerce Developers
http://www.ifourtechnolab.com
 Organization shall retain documented information on the information security
objectives.
 Information security objectives are documented and should be complied with
information security policies.
 Confidentiality, Integrity and Availability of information is documented to secure
information assets.
Documented information for Clause 6.2
Custom eCommerce Developers
http://www.ifourtechnolab.com
References
http://www.slideshare.net/null0x00/iso-27001-2013-changes
http://www.bsigroup.com/LocalFiles/en-GB/iso-iec-27001/resources/BSI-
ISO27001-transition-guide-UK-EN-pdf.pdf
https://en.wikipedia.org/wiki/ISO/IEC_27001:2013
http://www.iso27001security.com/html/27001.html
Custom eCommerce Developers
http://www.ifourtechnolab.com
iFour Consultancy Services
 Visit this website for more details:
http://www.ifourtechnolab.com
THANK YOU!!!
Custom eCommerce Developers
http://www.ifourtechnolab.com

Weitere ähnliche Inhalte

Andere mochten auch

Comparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT frameworkComparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT frameworkPooja Soni
 
Skills 13 14 reduced clauses
Skills 13 14 reduced clausesSkills 13 14 reduced clauses
Skills 13 14 reduced clausesMarla Yoshida
 
ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10Pooja Soni
 
Skills 9 10 noun clauses
Skills 9 10 noun clausesSkills 9 10 noun clauses
Skills 9 10 noun clausesMarla Yoshida
 
ISO 270001 Management Clause - 6
ISO 270001 Management Clause - 6ISO 270001 Management Clause - 6
ISO 270001 Management Clause - 6Pooja Soni
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaiFour Consultancy
 
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...iFour Consultancy
 
Skills 1 5 one clause
Skills 1 5 one clauseSkills 1 5 one clause
Skills 1 5 one clauseMarla Yoshida
 
Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...iFour Consultancy
 

Andere mochten auch (10)

Privacy Act
Privacy ActPrivacy Act
Privacy Act
 
Comparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT frameworkComparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT framework
 
Skills 13 14 reduced clauses
Skills 13 14 reduced clausesSkills 13 14 reduced clauses
Skills 13 14 reduced clauses
 
ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10
 
Skills 9 10 noun clauses
Skills 9 10 noun clausesSkills 9 10 noun clauses
Skills 9 10 noun clauses
 
ISO 270001 Management Clause - 6
ISO 270001 Management Clause - 6ISO 270001 Management Clause - 6
ISO 270001 Management Clause - 6
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in india
 
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
 
Skills 1 5 one clause
Skills 1 5 one clauseSkills 1 5 one clause
Skills 1 5 one clause
 
Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...Iso 27001 control a.7.2 – during employment - by software outsourcing company...
Iso 27001 control a.7.2 – during employment - by software outsourcing company...
 

Kürzlich hochgeladen

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Clause 6.1.3 & clause 6.2 - by software outsourcing company in India

  • 2.  Risk management process  Clause 6.1.3 : Risk treatment process  Risk treatment strategies  Clause 6.2 : Information security objectives  References Contents Custom eCommerce Developers http://www.ifourtechnolab.com
  • 3. Risk management process Custom eCommerce Developers http://www.ifourtechnolab.com
  • 4. Clause 6.1.3 Information Security Risk Treatment Organization should define and apply an information security risk treatment process, implementation and operation. Responds to risks evaluated in Clause 6.1.2(e) i.e. evaluation of information security risks of ISO 27001:2013. Documents all information related to this risk treatment process as Risk Treatment Plan (RTP). Custom eCommerce Developers http://www.ifourtechnolab.com
  • 5.  Select appropriate information security risk treatment options by taking account of the risk assessment results  Determine all controls that are necessary to implement the information security risk treatment options chosen above  Compare the controls determined in above step with those in Annexure A of ISO 27001:2013  Verify that no necessary controls have been omitted Risk treatment process Custom eCommerce Developers http://www.ifourtechnolab.com
  • 6. Risk treatment process (Continued)  Produce a Statement Of Applicability(SoA) that contains the necessary controls and justification for inclusions Assess whether necessary controls listed in Annexure A of ISO 27001:2013 are implemented or not Provide justification for exclusions of controls from Annexure A of ISO 27001:2013 Formulate information security risk treatment plan (RTP) Obtain risk owner’s approval of RTP and acceptance of the residual information security risks Custom eCommerce Developers http://www.ifourtechnolab.com
  • 7.  Risks can be treated in four ways:  Risk Acceptance  Risk Reduction  Risk Transference  Risk Avoidance Risk Treatment Strategies Custom eCommerce Developers http://www.ifourtechnolab.com
  • 8.  Risk Acceptance: Risks are acceptable with current controls  Risk Reduction: Risks are reduced by implementing additional controls  Risk Avoidance: Risks can not be reduced with current controls and risks are not accepted  Risk Transference: Risks are transferred to other third parties Risk Treatment Options Custom eCommerce Developers http://www.ifourtechnolab.com
  • 9. Documented Information for Clause 6.1.3 Organization should retain documented information about the information security risk treatment process. Information about risk treatment process is documented in two ways:  Risk Treatment Plan  Statement of Applicability Custom eCommerce Developers http://www.ifourtechnolab.com
  • 10. Organization shall establish information security objectives at relevant functions and levels. Information security objectives primarily concerns with: Confidentiality Integrity Availability Clause 6.2 : Information Security Objectives Confidentiality Integrity Availability Custom eCommerce Developers http://www.ifourtechnolab.com
  • 11.  Be consistent with information security policy  Be measurable  Be communicated  Be updated as appropriate  Take into account applicable information security requirements and results from risk assessment and risk treatment Information Security Objectives Characteristics Custom eCommerce Developers http://www.ifourtechnolab.com
  • 12.  Organization shall determine following information to achieve information security objectives: What will be done What resources will be required Who will be responsible When it will be completed How the results will be evaluated Information Security Objectives Requirements Custom eCommerce Developers http://www.ifourtechnolab.com
  • 13.  Organization shall retain documented information on the information security objectives.  Information security objectives are documented and should be complied with information security policies.  Confidentiality, Integrity and Availability of information is documented to secure information assets. Documented information for Clause 6.2 Custom eCommerce Developers http://www.ifourtechnolab.com
  • 15. iFour Consultancy Services  Visit this website for more details: http://www.ifourtechnolab.com THANK YOU!!! Custom eCommerce Developers http://www.ifourtechnolab.com

Hinweis der Redaktion

  1. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  2. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  3. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  4. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  5. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  6. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  7. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  8. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  9. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  10. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  11. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  12. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  13. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  14. Custom eCommerce Developers – http://www.ifourtechnolab.com/
  15. Custom eCommerce Developers – http://www.ifourtechnolab.com/