ISO 27001 Gap Analysis

advertisement
DELL SECUREWORKS CONSULTING SERVICES AGREEMENT
STATEMENT OF WORK NUMBER #____
This STATEMENT OF WORK (“SOW”), effective as of Insert Date is made pursuant to the [Master Services
Agreement], [Consulting Services Agreement] [Consulting Services Addendum] dated Insert Date by and between
Dell Corporation Limited trading as Dell SecureWorks with its registered office address at Dell House, Cain Road,
Bracknell, Berkshire RG12 1LF (“Dell SecureWorks”) and Insert Company Name with its principal place of
business located at Insert Company Location (“Client”).
1.0Scope
Geographic Locations
There are elements of this project that will be delivered remotely at Dell SecureWorks facilities and on-site at the
following location
●
CUSTOMER ADDRESS
ISO 27001 Gap Analysis
The scope of the service delivery outlined in the following sections is for the provision of consultancy services to
complete an ISO 27001 gap assessment. The gap assessment will be a study to compare existing information
security management practices and controls against, those recommended by the ISO27001 standard.
Future steps
Once the gap assessment has been completed, there are a number of steps required as part of the process towards
ISO27001 certification. The approach to these activities will require to be fully defined once the gap assessment is
complete and any remediation activities have been undertaken; however, an overview of the requirements have been
included within this Statement of Work for information purposes.
Out of Scope

Locations, devices or personnel not specifically listed as in scope is out of scope.
Note: If any IP addresses, hosts, facilities or web applications within scope are owned or hosted with a service
provider or other third party, it will be necessary for you to obtain permission from that party before Dell
SecureWorks will perform testing in writing or through email. Or you may provide a suitable alternate testing
environment.
2.0Statement of Work
Dell SecureWorks utilises a three phase methodology for delivering ISO27001 projects:
1)
Gap Analysis
2)
Remediation and Compliance Progression
3)
Pre-Audit
Starting with a Gap Analysis as the foundation for the project, the information gathered from this phase is then used
as a driver for the Remediation and Compliance Progression phases which tends to be the largest of the phases. This
utilises the Dell SecureWorks experts to help drive forward the compliance programme and assist in the building of
an Information Security Management System. The final phase is a Pre-Audit where our consultants will deliver a
mock ISO27001 audit to assess and also feedback on the customer’s environment prior to a real, third-party
assessment.
1 of 8
This project requires phases 1 and 2 only.
2.1
Phase 1 - Gap Analysis
Dell SecureWorks has been asked to deliver a gap analysis of existing policies and procedures against the standard.
Dell SecureWorks will provide the consultants from our information assurance team, all of whom have extensive
experience delivering similar projects across a wide range of environments. It is this team of consultants, their
experience, and our proven methodology which will ensure the success of this project in the most straightforward
and resource-effective manner.
The methodology that we are proposing to utilise has been developed specifically for use within organisations
looking to certify with ISO 27001 across business functions as opposed to those looking to focus exclusively on
Information Technology. Whilst adhering to ISO 27001 in pursuit of alignment, our approach ensures that we
deliver practical and achievable advice, support and guidance to effectively assist clients in achieving business buy
in and maintaining an acceptable information security process.
Developments within the field of ISO certification, in particular the focus now upon risk management and
measurement, have instigated the on-going development of our methodology to utilise elements of COBIT4 within a
5-point Capability Maturity Model. Our experience in delivering these projects for other customers has ensured that
this methodology provides support for the organisation during the initial stages of the project and during the
certification process.
Despite our innovative approach however we are committed to delivering and adhering to the specific requirements
of ISO 27001 which, by definition, requires the progression through standard, auditable phases.
The phases in the gap analysis are:
Scoping
This is a short exercise; however it is essential for the development of a well-defined project across all facets of the
business. Dell SecureWorks understands the expectation is to include all business processes. The scoping exercise
will identify the physical scoped environment, confirm the interdependencies with third parties, and define and
document the scope and boundaries of the Information Security Management System. This process will also define
the approach to the establishment and implementation of the ISMS.
Information gathering and analysis
Dell SecureWorks will collect and review existing information security policy and the policies, baselines and
procedures which support the information security policy and the business functions. Using the information gathered
in the scoping phase, a gap analysis against the requirements of ISO 27001 will be undertaken. The gap analysis
exercise is designed to identify variances between current information security management practices, encompassing
policies, standards and procedures and those suggested by the ISO 27001 standard for Information Security
Management Systems and the ISO 27002 code of practice. The gap analysis can be a rather intrusive exercise and
may require consultation with business area heads in addition to support staff (e.g. from IT, HR, Facilities,
Compliance/Legal).
Dell SecureWorks will conduct a survey of the security management practices in the following control categories:
●
Standards/Security policy - Provides management direction and support for information security.
●
Organization of assets and resources – helps manage information security within the organization
●
Asset classification and control – helps identify assets and appropriately protect them
●
Personnel security - reduces the risks of human error, theft, fraud or misuse of facilities
●
Physical and environmental security – prevents unauthorized access, damage and interference to business
premises and information
●
Communications and operations management – ensures the correct and secure operation of information
processing facilities
●
Access control – controls access to information
2 of 8
●
Systems development and maintenance – ensures that security is built into information systems
●
Business continuity management - counteracts interruptions to business activities and to protect critical
business processes from the effects of major failures or disasters
●
Compliance - To avoid breaches of any criminal and civil law, statutory, regulatory or contractual
obligations, and any security requirement
●
Business Process Controls – Controls relating to select relevant SAS 70 control objectives relating to key
processes
●
Technical Controls
o
System access
o
Network Architecture
o
Network Access
o
Controls Zones
o
Encryption and Protocols
o
System secure state (vulnerability scans)
To conduct this gap analysis, the following methods may be used:
●
Collect documentation (policies, plans, standards, procedures, guidelines, drawings, etc)
●
Develop questionnaires for measuring control areas
●
Conduct Interviews to elicit conformance with best practices
●
Conduct technical tests of controls (vulnerability scanning, host audits, etc)
●
Elicitation sessions to produce adherence to formal company policies and procedures.
●
Conduct Interviews to elicit conformance to regulatory controls and guidance
●
Selectively validate configurations, procedures, and processes
Deliverables
The output from the gap analysis will be a detailed report and completed ISO 27001 statement of applicability on the
compliance of the customer’s information security management processes and controls against the ISO 27001
standard. This will include the results from assessment against the capability maturity model in order to assess the
maturity of the customer in each of the 12 focus areas of ISO 27001 (the Information Security Management System
plus the 11 sections of Annex A).
2.2
Phase 2 - Remediation and compliance progression
Once the current status of a customer is known with regard to ISO27001 compliance, Dell SecureWorks can assist
further in driving the compliance progression forward through remediation advice and guidance. This phase of an
ISO27001 project is generally the most effort intensive and consists of the following stages.
Establish Management Commitment and Organisational ISMS Structure
Preparation of a one page high-level management commitment statement will commence. This will serve as an
advertisement to all employees that senior management are committing to company wide information risk and
information security management. The statement will set out the aims and expectations of the approach and will
state that the customer is committed to aligning with the ISO 27001 framework in order to achieve the stated
goals. The statement will also seek to gain the buy-in of all staff by setting out Senior Management’s expectations
of participation, support and contribution of all staff to the development and operation of information security
management practices.
3 of 8
This stage also helps to identify the appropriate forum for the discussion of information security and oversight of the
information security management project.
Plan for and Establish ISMS Risk Assessment Methodology
A high-level assessment of information risks to customer key business processes as a result of failure or compromise
of information confidentiality, integrity or availability will be carried out across the agreed business divisions within
the customer’s organisation.
First stage of the risk assessment process: business impact analysis. Conduct a short workshop with senior
management to define what ISO 27001 is and how it may assist in delivering information risk management. This
workshop will also complete a business impact analysis to uncover what department heads see as the most relevant
information risks and help establish the business impacts that may result as a consequence of any information risk
occurring. The business impact analysis output will be used to feed into existing impact definitions.
The risk assessment will utilise the business impact analysis output as a starting point and use the defined impact
levels and risk appetite to analyse and assess the identified risks. The risk assessment exercise will allow for
meaningful prioritisation of the recommendations from the gap analysis report, allow for documentation of a
prioritised risk treatment plan and provide focus for the development of the Information Security Management
System.
ISMS Implementation
Now that the foundations of the security improvement programme are in place and the initial basic requirements of
ISO 27001 have been met, the next stage is to implement the risk management plan.
The output from the preceding risk assessment and gap analysis will form the basis of the development of on-going
information security risk management strategy. Utilising either the existing corporate risk management processes, or
introducing new processes, this stage will result in the development of the IS risk register/risk management plan, a
risk manual, and the agreement of an organisational framework to facilitate high level visibility of the organisation’s
information security risk footprint.
Where risk management is a new concept, then the elapsed time for this phase may be extended pending decisions
upon the approach to be adopted.
The risk management plan is the basis of this phase. The management forum established in the previous phase must
agree the risk treatment decisions and support the agreed actions. The Dell SecureWorks consultant will assist
where required with the specification and definition of controls and actions to mitigate identified risks.
In addition, during this phase, the Information Security Policy, supporting policies, procedures and work instructions
shall be created, as required. These items may exist either in paper form, electronically or delivered via an Intranet
however they should remain subject to version and publication control. Certification specific documentation may
also be prepared at this stage such as the Statement of Applicability, Compliance Programme, Security Framework
and metrics. The ISMS will include the security controls in ISO27002.
This phase will also require the completion of information security awareness education and training to ensure that
all staff are aware of their information security obligations and, where appropriate, are trained in the procedures
necessary to ensure the security of information.
The ISMS implementation is the longest phase in an ISO 27001 project - weighted at the beginning with
consultancy support from Dell SecureWorks, with an increased level of activity near the end of this phase.
2.3
Phase 3 - Pre-Audit
This phase will include focus on the audits of the newly developed ISMS and the successful implementation within
the customer.
ISMS audits are required for any organisation seeking certification. However, a compliance programme, utilising
audits as the main tool of investigation, should also be implemented even where certification is not the ultimate
goal. ISMS audits are a useful tool to assess the effectiveness of the ISMS and the controls implemented to mitigate
risks. Through a scheduled compliance programme of audits covering all requirements of ISO27001 as well as all
4 of 8
allocable control objectives from ISO 27002, weaknesses and non-compliances can be identified and improvements
made to the ISMS.
It is expected that by the time this phase is reached, most customers will have achieved a level of maturity in
operating the ISMS, that the Dell SecureWorks consultant will carry out the audits and provide reports to the
management forum, who will take forward actions to address any concerns or non-compliances raised.
This project will be delivered using the Dell SecureWorks project management methodology, templates and
processes.
3.0Deliverables
The output from the gap analysis will be a detailed report and completed ISO 27001 statement of applicability on the
compliance of the customer’s information security management processes and controls against the ISO 27001
standard. This will include the results from assessment against the capability maturity model in order to assess the
maturity of the customer in each of the 12 focus areas of ISO 27001 (the Information Security Management System
plus the 11 sections of Annex A).
4.0Draft and final report
Dell SecureWorks will provide preliminary draft findings to the technical point of contact for review and
clarification. The final report will be issued after review and discussion are complete. Presentation of the findings
and exact deliverables are custom tailored to the type of work performed, and to customer needs. Final reporting and
deliverables will be defined during the project, as well as interim or ad-hoc reporting. Dell SecureWorks
deliverables typically follow a standard format with two sections.
The first section is targeted toward a non-technical audience - Senior Management, Auditors, Board of Directors
and other concerned parties:
●
Executive summary – A jargon and buzz-word free true executive-level summary.
Summary of findings and recommendations – The report describes the environment and high-level
findings and root causes. We make recommendations based on risk to your organisation.
●
●
Compliance status – This section describes the compliance status measured against the ISO Standard.
The second section is targeted to technical staff and provides more granular detail:
●
Summary of methods – This section contains details specific to the engagement methodology.
Detailed findings and recommendations – This section documents the details of any findings as well as
recommendations for remediation. Evidence of controls and information sufficient to replicate the findings is
included. Recommendations are based on these root causes and prioritised for a risk-based remediation with an
estimation of relative work effort. Where strong controls in place have been identified they are described, as well
as their impact to the security of the organisation.
●
Attachments – Details and specific examples are provided, including screen shots, technical details, code
excerpts and other relevant observations. This section also contains documents or data which are relevant but do
not fit in other categories.
●
4.1
Report Timing
Within three weeks of concluding the work described above, we will issue a draft formal report to your point of
contact. The three weeks following delivery of this draft report are your opportunity to provide comments
concerning the nature and scope of the engagement to be included in the report. If there are no comments in the
three-week comment period, we will finalise the report for distribution. If no changes are required, we encourage
you to accept the formal report prior to the three week waiting period to expedite final delivery.
5 of 8
5.0Timing and Fees
5.1
Fees
The work shall be delivered as a fixed price engagement and limited to a maximum of <insert> days.
The cost of this engagement excluding expenses is £ZZZ
Including expenses, client's total payments under this SOW shall be limited to a maximum of £ZZZZ excluding
VAT.
Terms for this engagement;
 X% billed at point Y
The work is estimated as requiring <insert> days. This SOW is a Time & Materials engagement with an estimated
cost of £ZZZZ excluding VAT based on a daily billing rate of £XXXXX. The final amount shall be determined on
the basis of the actual amount of time spent on the work. The Parties shall agree any increase of the cost limit in
advance, in writing. Client will be invoiced monthly for work activity conducted against this SOW.
The price for the engagement is based on the target environment as discussed with Dell SecureWorks. If the
assumptions, client responsibilities and parameters within the scope of work used to develop this proposal are found
to be incorrect, or to have changed, the parties agree to pursue resolution through change management.
If any of the assumptions used in developing this proposal (including, time on tasks, locations and service
consumption) and relied upon by Dell SecureWorks vary by +/- five (5%) percent, Dell SecureWorks reserves the
right to adjust the pricing to reflect such changes.
Any additional work required beyond our current estimate will be added to our invoices at the daily billing rate
given above.
The following conditions apply to this SOW;
●
The fees outlined in our scope of services include all incidental out-of-pocket expenses including report
preparation and reproduction, faxes, copying, etc.
●
The fees outlined in our scope of services do NOT include out-of-pocket travel expenses, including
reasonable transportation, meals and lodging expenses incurred to perform any of the services outlined
hereunder. Such reasonable out of pocket expenses will be added at cost to Client’s invoice.
●
Terms for payments are net 30.
●
VAT, at the prevailing rate, will be added to all applicable charges.
5.2
Timing
Dell SecureWorks will make commercially reasonable efforts to meet Client’s requests for dates and times for the
contracted work to be performed. The fees do not include weekend or after hours work. Such work can only be
scheduled by mutual agreement, in advance. After hours and weekend work will be conducted at 1.5 times our
quoted rate. Email confirmation of an agreed upon schedule, sent by Dell SecureWorks, confirmed by email by the
Client, shall constitute formal acceptance of such schedule. Once scheduling of any work has been mutually agreed
upon, and the schedule is formally accepted by the Client, changes by the Client within 2 weeks of the project
initiation will incur a one day rate re-scheduling fee for each instance.
Dell SecureWorks has made the following assumptions in creating this SOW:
●
Client resources are scheduled and available to Dell SecureWorks;
●
Client has provided suitable workspace for Dell SecureWorks’ staff and equipment,
●
Client’s computer systems and network for testing, building access, etc. is made available to Dell
SecureWorks; and
6 of 8
●
5.3
Client replies to all document requests and other information in a timely manner.
Term
The term of this SOW and the Services hereunder shall commence on the date this SOW is executed by both parties
and terminate on the date which is one (1) year thereafter.
6.0 Disclaimers
Applicable to Security Services: Should a Statement of Work include security scanning, testing, assessment,
forensics, or remediation Services (“Security Services”), Client understands that Dell SecureWorks may use various
methods and software tools to probe network resources for security-related information and to detect actual or
potential security flaws and vulnerabilities. Client authorises Dell SecureWorks to perform such Security Services
(and all such tasks and tests reasonably contemplated by or reasonably necessary to perform the Security Services or
otherwise approved by Client from time to time) on network resources with the IP Addresses identified by Client.
Client represents that, if Client does not own such network resources, it will have obtained consent and authorisation
from the applicable third party, in form and substance satisfactory to Dell SecureWorks, to permit Dell SecureWorks
to provide the Security Services. Dell SecureWorks shall perform Security Services during a timeframe mutually
agreed upon with Client. The Security Services, such as penetration testing or vulnerability assessments , may also
entail buffer overflows, fat pings, operating system specific exploits, and attacks specific to custom coded
applications but will exclude intentional and deliberate Denial of Service Attacks. Furthermore, Client
acknowledges that the Security Services described herein could possibly result in service interruptions or
degradation regarding the Client’s systems and accepts those risks and consequences. Client hereby consents and
authorises Consultant to provide any or all the Security Services with respect to the Client’s systems. Client further
acknowledges it is the Client’s responsibility to restore network computer systems to a secure configuration after
Consultant testing.
Applicable to Compliance Services: Should a Statement of Work include compliance testing or assessment or
other similar compliance advisory Services (“Compliance Services”), Client understands that, although Dell
SecureWorks' Compliance Services may discuss or relate to legal issues, Dell SecureWorks does not provide legal
advice or services, none of such Services shall be deemed, construed as or constitute legal advice and that Client is
ultimately responsible for retaining its own legal counsel to provide legal advice, Furthermore, any written
summaries or reports provided by Dell SecureWorks in connection with any Compliance Services shall not be
deemed to be legal opinions and may not and should not be relied upon as proof, evidence or any guarantee or
assurance as to Client’s legal or regulatory compliance.
Applicable to PCI Compliance Services: Should a Statement of Work include PCI compliance auditing, testing or
assessment or other similar PCI compliance advisory Consulting Services (“PCI Compliance Services”), Client
understands that Dell SecureWorks' PCI Compliance Services do not constitute any guarantee or assurance that
security of Client’s systems, networks and assets cannot be breached or are not at risk. These Services are an
assessment, as of a particular date, of whether Client’s systems, networks and assets, and any compensating controls
meet the applicable PCI standards. Mere compliance with PCI standards may not be sufficient to eliminate all risks
of a security breach of Client’s systems, networks and assets. Furthermore, Dell SecureWorks is not responsible for
updating its reports and assessments, or enquiring as to the occurrence or absence of such, in light of subsequent
changes to Client’s systems, networks and assets after the date of Dell SecureWorks’ final report, absent a signed
Statement of Work expressly requiring the same.
Purchase Orders: This Statement of Work is agreed to by the parties. Any terms and conditions attached to, or
described within any purchase order outside of this Statement of Work by Client in connection with this Statement
of Work are null and void.
Applicable to Onsite Services: Notwithstanding employees’ placement at the Client location, Dell SecureWorks
retains the right to control the work of the employee. For international travel, Onsite Services may require additional
documentation, such as Visas, visitor invitations, etc. which may affect timing and out of pocket costs.
7 of 8
DELL CORPORATION LIMITED
Insert Company Name
By:_________________________
By:_____________________________
Title:_______________________
Title:___________________________
_____________________________
Date
________________________________
Date
8 of 8
Download