ISO 27002- INTRODUCTION

ISO 27002- INTRODUCTION

1. Information Security Requirements

ISO 27002- INTRODUCTION, With the ever growing and sophisticated technoscapes that span our world, it is really important for organizations to look after its security measures. Consumers are therefore demanding greater transparency from businesses about the data they collect – and the compliances which they are following. Thus, proper certifications and due diligence assures every stakeholder’s mind that their organisation is taking data privacy seriously. Towards this, there are three main sources of security requirements:

  1. Risk Assessment
    – Identifying vulnerabilities and threats to assets

    – Evaluating the likelihood of risk to those assets
    – Estimate the potential impact
  2. Legal, Statutory, Regulatory and Contractual requirements
    An organization should meet these requirements along with the needs of social-cultural environment as well as its stakeholders’ requirements.
  3. Principles and Objectives
    Requirements to support business operations- information management, processing, storing and communication Requirements to support business operations- information management, processing, storing and communicating.

The resources used in implementing controls should be structured in such a way that it safeguards the assets from the attacks which may happen in the absences of these controls. The results of the risk assessment will help us identify appropriate management actions and objectives for the better oversight of information security controls to safeguard assets against those risks.

Here at Infosvvy we provide detail information and knowledge about Standard ISO 27001 and knowledge about the standard ISO 27001 and its sister guidance other standard ISO/IEC 27002 and ISO/IEC 27005 which provides information security risk management guidance which includes advice on risk assessment, risk treatment, risk acceptance, risk communication, monitoring and risk review. Infosavvy provides training of IRCA CQI ISO 27001 Lead Auditor (LA) and ISO 27001 Lead Implementer (LI) (training certified by TÜV SÜD)

2. Security Controls

Controls are mainly selected from this standard or from other control sets, or new controls are designed depending on the need of security to the assets of the organization. The organization may choose to enforce certain security controls recommended for the level of risk assigned and standards for risk acceptance, risk treatment options to the information systems  or reinforce them with additional security controls to further improve the security and will even be subjected to all or any relevant national and international legislation and regulations.

Related Product : ISO 27001 Lead Auditor Training And Certification ISMS

3. Developing your own guidelines

While developing guidelines one thing which needs to be kept in mind is the results of risk assessment, it gives the developer an acute picture of security needs specific to their organization. Remember, all the control and guidelines mentioned in the code of practice may sometimes be not applicable in certain scenarios, at the same time there can instances where you might require few controls and guidelines which are not included in this standard. When new guidelines and controls are introduced in documents, cross references to the said clauses should be mentioned in the standards, if applicable; to enable auditors or business partners to affectively monitor compliance.

4. Lifecycle considerations

Information too has a lifecycle, it starts from creation then storage, processing, transformation and eventually get demise but the value and risk to the information which is an asset to the organization may vary during its lifecycle. Ex. Unauthorized disclosure or theft of a company’s financial accounts.

The information system is no different, its life cycle phases include the conception, specification, design, development, testing, implementation, use and retention and eventually disposal. Information System is the necessary requirement at every stage of the operations. New system implementations and improvements to existing systems create opportunities for companies to upgrade and strengthen security procedures, taking into account tragic past events and current and expected cyber security threats.

5. Related Standards

While studying about this standard we understood that ISO 27002 provides guidance on wide range of security controls which when implemented in organization can safeguards its assets. ISO/IEC 27000 family comprises of many standards which offers advices or tell about the requirements’ for managing information security.

Refer ISO / IEC 27000 for general guideline of both the ISMS and the family of standards. ISO / IEC 27000 includes a glossary that explicitly specifies most of the terminology used in the ISO / IEC 27000 family of standards and illustrates the purpose and goals of each family member.

Questions related to this topic

1. What is risk assessment in ISO 27001?
2. What is business risk approach in ISO 27001?
3. What are ISO 27001 controls?
4. What does ISO 27001 mean?
5. Explain ISO 27002- INTRODUCTION?

ISO 27001 Requirements


Clause 4.2 Understanding the needs and expectations of interested parties 
Clause 4.4 Information security management system
Clause 4.3 Determining the scope of the information security management system
Clause 5.1 Leadership and commitment
Clause 5.2 Policy
Clause 5.3 Organizational roles, responsibilities and authorities 
Clause 6.1 Actions to address risks and opportunities
Clause 6.1.2 Information security risk assessment process
Clause 6.1.3 Information security risk treatment
Clause 6.2 Information security objectives & planning
Clause 7.1 Resources
Clause 7.2 Competence
Clause 7.3 Awareness
Clause 7.4 Communication
Clause 7.5 Documented information Implementation Guideline
Clause 8.1 Operational planning & control
Clause 8.2 Information security risk assessment
Clause 8.3 Information security risk treatment
Clause 9.1 Performance evaluation Monitoring, measurement, analysis & evaluation
Clause 9.2 Internal audit
Clause 9.3 Management review
Clause 10.1 Non conformity and corrective action
Clause 10.2 Continual Improvement 

ISO 27001 Annex A Controls


Annex A.5 Information Security Policies
Annex A.6 Organization of Information Security
Annex A.6.2 Mobile Devices and Teleworking
Annex A.7 Human Resource Security
Annex A.7.2 During Employment
Annex A.7.3 Termination and Change of Employment
Annex A.8 Asset Management
Annex A.8.1.3 Acceptable Use of Assets & A.8.1.4 Return of Assets
Annex A.8.2 Information Classification
Annex A.8.2.2 Labeling of Information & A.8.2.3 Handling of Assets
Annex A.8.3 Media Handling
Annex A.9.1.2 Access to Networks and Network Services
Annex A.9.2 User Access Management
Annex A.9.2.3 Management of Privileged Access Rights  
Annex A.9.2.4 Management of Secret Authentication Information of Users
Annex A.9.2.5 Review of User Access Rights 
Annex A.9.2.6 Removal or Adjustment of Access Rights
Annex A.9.3 User Responsibilities
Annex A.9.4 System and Application Access Control
Annex A.9.4.4 Use of Privileged Utility Programs 
Annex A.9.4.5 Access Control to Program Source Code
Annex A.10 Cryptography
Annex A.11 Physical and Environmental Security
Annex A.11.2 Equipment
Annex A.11.1.3 Securing Offices, Rooms and Facilities
Annex A.11.1.4 Protecting Against External and Environmental Threats
Annex A.11.1.5 Working in Secure Areas
Annex A.11.1.6 Delivery and Loading Areas
Annex A.11.2.4 Equipment Maintenance
Annex A.11.2.5 Removal of Assets
Annex A.11.2.6 Security of Kit and Assets Off-Premises
Annex A.11.2.7 Secure Disposal or Re-use of Equipment
Annex A.11.2.8 Unattended User Equipment
Annex A.11.2.9 Clear Desk and Clear Screen Policy
Annex A.12 Operations Security
Annex A.12.2 Protection from Malware
Annex A.12.3 Backup
Annex A.12.4 Logging and Monitoring
Annex A.12.5 Control of Operational Software
Annex A.12.6 Technical Vulnerability Management
Annex A.12.7 Information Systems Audit Considerations
Annex A.13 Communications Security
Annex A.13.2 Information Transfer
Annex A.13.2.3 Electronic Messaging
Annex A.13.2.4 Confidentiality or Non-Disclosure Agreements
Annex 14 System Acquisition, Development and Maintenance
Annex A.14.1.2 Securing Application Services on Public Networks
Annex A.14.1.3 Protecting Application Services Transactions
Annex A.14.2 Security in Development and Support Processes
Annex A.14.2.3 Technical Review of Applications after Operating Platform Changes
Annex A.14.2.4 Restrictions on Changes to Software Packages
Annex A.14.2.5 Secure System Engineering Principles
Annex A.14.2.6 Secure Development Environment
Annex A.14.2.7 Outsourced Development
Annex A.14.2.8 System Security Testing
Annex A.14.2.9 System Acceptance Testing
Annex A.14.3 Test data
Annex A.15 Supplier Relationships
Annex A.15.1.2 Addressing Security Within Supplier Agreements
Annex A.15.1.3 Information and Communication Technology Supply Chain
Annex A.15.2 Supplier Service Delivery Management
Annex A.16 Information Security Incident Management
Annex A.16.1.2 Reporting Information Security Events
Annex A.16.1.3 Reporting Information Security Weaknesses
Annex A.16.1.4 Assessment of and Decision on Information Security Events
Annex A.16.1.5 Response to Information Security Incidents
Annex A.16.1.6 Learning from Information Security Incidents
Annex A.16.1.7 Collection of Evidence
Annex A.17 Information Security Aspects of Business Continuity Management
Annex A.17.1.3 Verify, Review and Evaluate Information Security Continuity
Annex A.18 Compliance
Annex A.18.1.3 Protection of Records
Annex A.18.1.4 Privacy and Protection of Personally Identifiable Information
Annex A.18.1.5 Regulation of Cryptographic Controls
Annex 18.2 Information Security Reviews

About ISO 27002



This Blog Article is posted by
Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com

https://g.co/kgs/ttqPpZ

Leave a Comment