Uploaded by vksgeek

27001-2013 ISOGeek

Transition to ISO/IEC 27001:2013
Varinder Kumar
Principal Consultant
CEH,CISA,MEPTM, ITIL V3, LA27001, LA9001
Questions
What has changed?
What you need to know?
Transition timeline?
Any other questions?
What has changed?
Structural change
ISO/IEC 27001:2005
ISO/IEC 27001:2013
Management
Responsibility
Context of the
Organization
Management Review
Leadership
Establish
ISMS
Improve
ISMS
Planning
Implement
ISMS
Monitor
ISMS
Doc.
Req.
Internal
Audit
Mgmt.
Review
Improvement
Structure
simplified
ISMS
Improve
Operation
Performance
Evaluation
Support
Highlights of Changes
• Structure change is part of harmonization effort from ISO
• Annex SL – 10 Mandatory Clauses introduced – no
exclusions from Cl 4 to 10
• Better alignment with business objectives
• More emphasis on:
–
–
–
–
Risk management
Planning
Measurement
Communication
• The word “documented procedure” is replaced with
“documented information” in the body of the standard (410)
Summary of Changes
ISO/IEC 27001:2005
ISO/IEC 27001:2013
•132 “shall” statements
(section 4-8)
•125 “shall” statements
(section 4-10)
•Annexure A
•Annexure A
– 11 clauses
– 39 categories
– 133 controls
– 14 clauses
– 35 categories
– 114 controls
Number of requirements
reduced
What you need to
know?
4.0 Context of the organization
Interested
parties
- Customers,
Shareholders,
Regulatory
agencies
4.1 Understanding
the organization
and its context
• Determine external and
internal issues to its
purpose and relevant to
ISMS
• May refer to ISO 31000
Biz risks,
opportunities
4.2 Understanding
the need and
expectation of
interested parties
• Interested parties relevant
to ISMS
• Requirements relevant to
ISMS
• Regulatory requirements
ISMS
requirements
4.4 ISMS
4.3 Determine
scope of the ISMS
• Internal and external
issues
• Requirements of
interested parties
• Interface between
organizations
5.0 Leadership
5.1 Leadership and
commitment
• Top management have to provide evidence of:
• Directing and supporting personnel
• Supporting next level management to
demonstrate leadership
5.2 Policy
• Policy should include a statement of continual
improvement.
• Policy should be communicated
5.3 Organizational
roles,
responsibilities and
authorities
• More explicit requirements for defining line of
reporting and authorities..
6.0 Planning
6.1 Actions to
address risks and
opportunities
6.2 ISMS objectives
and planning to
achieve them
• ISMS planning to address business risks and
opportunities
• Establish method for information security risk
assessment
• Identify risk owners
• Risk owners approval of residual risks
• ISMS objectives for different functions and
levels
• Objectives should be measurable
• Consistent with risk treatment plan
• Develop plan to achieve objectives
7.0 Support
7.1 Resource
• No change
7.2 Competency
• No change
7.3 Awareness
7.4 Communication
7.5 Documented
information
• It is now an explicit requirement
• Need to define a procedure for internal and
external communication
• Need to define process for document creation,
approval and release
8.0 Operation
8.1 Operational
planning and control
• Implement the plan identified in 6.2
• Determine operational controls required to
operate ISMS
• Identify controls required for outsourced
process
8.2 Information
security risk
assessment
• No change
8.3 Information
security risk
treatment
• No change
9.0 Performance evaluation
9.1 Monitoring,
measurement,
analysis and
evaluation
• Organization shall determine:
• What needs to be monitored and measured
• Method of monitoring, measurement, analysis
and evaluation
• When monitoring and measuring to be
performed and who will perform.
• When results of monitoring to be analyzed
and evaluated. Who will perform.
9.2 Internal audit
• No change
9.3 Management
review
• No change
10.0 Improvement
10.1 Non-conformity
and corrective
action
10.2 Continual
improvement
• Similar to corrective action
• Section on preventive action have been deleted
• No change
Controls – Annex A
Grouping of controls
#
Clauses
A.5
Information security policies
A.6
Organization of information security
A.7
Human resource security
A.8
Asset management
A.9
Access control
A.10
Cryptography
A.11
Physical and environmental security
A.12
Operations security
A.13
Communications security
A.14
System acquisition, development and maintenance
A.15
Supplier relationships
A.16
Information security incident management
A.17
Information security aspects of business continuity management
A.18
Compliance
New and changed controls
A.6 Organization of information security
Objective
A.6.1 Internal organization
expanded
Objective: To establish a management framework to initiate and control the
implementation and operation of information security within the organization.
A.6.1.5
Information security
in project management
New
Control
Information security shall be addressed in
project management, regardless of the
type of the project.
A.6.2 Mobile device and teleworking
Objective: To ensure the security of teleworking and use of mobile devices.
A.6.2.1
Changed
Mobile device policy
Old control A.11.7.1
Control
A policy and supporting security measures
shall be adopted to manage the risks
introduced by using mobile devices.
New and changed controls
A.9 Access control
A.9.2 User access management
Objective: To ensure authorized user access and to prevent unauthorized access to
systems and services.
A.9.2.1
Changed
A.9.2.2
User registration and
de-registration
Old control A.11.2.1
User access
provisioning
Control
A formal user access provisioning process shall
be implemented to assign or revoke access
rights for all user types to all systems and
services.
Removal or adjustment
of access rights
Control
The access rights of all employees and external
party users to information and information
processing facilities shall be removed upon
termination of their employment, contract or
agreement, or adjusted upon change.
New
A.9.2.6
Changed
Control
A formal user registration and de-registration
process shall be implemented to enable
assignment of access rights.
Old control A. 8.3.3
New and changed controls
A.12 Operations security
A.12.5 Control of operational software
Objective: To ensure the integrity of operational systems.
A.12.5.1
Installation of software
on operational systems
New
New
Control
Procedures shall be implemented to
control the installation of software on
operational systems.
A.12.6 Technical vulnerability management
Objective: To prevent exploitation of technical vulnerabilities.
A.12.6.2
New
Restrictions on
software
installation
Control
Rules governing the installation of
software by users shall be established and
implemented.
New and changed controls
A.14 System acquisition, development and maintenance
A.14.1 Security requirements of information system
Objective: To ensure that information security is an integral part of information
systems across the entire lifecycle. This also includes the requirements for
information systems which provide services over public networks.
Objective
expanded
A.14.1.2
Securing application
Control
services on public
Information involved in application services
networks
passing over public networks shall be
Changed
protected from fraudulent activity, contract
Old control A.10.9.1
dispute and unauthorized disclosure and
modification.
A.14.1.3
Changed
Protecting
application
services
transactions
Old control
A.10.9.2
Control
Information involved in application service
transactions shall be protected to prevent
incomplete transmission, mis-routing,
unauthorized message alteration,
unauthorized disclosure, unauthorized
message duplication or replay.
New and changed controls
A.14 System acquisition, development and maintenance
Objective
expanded
A.14.2 Security in development and support process
Objective: To ensure that information security is designed and implemented
within the development lifecycle of information systems.
A.14.2.1
Secure development
policy
Control
Rules for the development of software and
systems shall be established and applied to
developments within the organization.
Secure system
engineering
principles
Control
Principles for engineering secure systems
shall be established, documented,
maintained and applied to any information
system implementation efforts.
Secure development
environment
Control
Organizations shall establish and
appropriately protect secure development
environments for system development and
integration efforts that cover the entire
system development lifecycle.
New
A.14.2.5
New
A.14.2.6
New
New and changed controls
A.14 System acquisition, development and maintenance
A.14.2.8
System security
testing
Control
Testing of security functionality shall be
carried out during development.
System acceptance
testing
Control
Acceptance testing programs and related
criteria shall be established for new
information systems, upgrades and new
versions.
New
A.14.2.9
Changed
Old control A.10.3.2
New and changed controls
A.15 Supplier relationship
A.15.1 Information security in supplier relationship
Objective: To ensure protection of the organization’s assets that is accessible by
suppliers.
New
A.15.1.1
New
A.15.1.3
New
Information security
policy for supplier
relationships
Control
Information security requirements for
mitigating the risks associated with
supplier’s access to the organization’s
assets shall be
agreed with the supplier and documented.
Information and
communication
Technology supply
chain
Control
Agreements with suppliers shall include
requirements to address the information
security risks associated with information
and
communications technology services and
product supply chain.
New and changed controls
A.16 Information security incident management
A.16.1 Management of information security incidents and improvements
Objective: To ensure a consistent and effective approach to the management of
information security incidents, including communication on security events and
weaknesses.
Combined A13.1, A13.2
A.16.1.4
New
A.16.1.5
New
Assessment of and
decision on
information security
events
Control
Information security events shall be
assessed and it shall be decided if they are
to be classified as information security
incidents.
Response to
information
security incidents
Control
Information security incidents shall be
responded to in accordance with the
documented procedures.
New and changed controls
A.17 Information security aspects of business continuity management
A.17.2 Redundancies
Objective: To ensure availability of information processing facilities.
A.17.2.1
New
Availability of
information
Processing
facilities
Control
Information processing facilities shall
be implemented with redundancy
sufficient to meet availability
requirements.
Helpful guidelines
• ISO/IEC 27002:2013- Code of practice for
information security controls
• ISO/IEC 27000:2014 – Information security
management system overview and vocabulary
• ISO 31000:2009 – Risk management principles
and guidelines
Transition timeline?
Transition Timeline
ISO/IEC 27001:2013
Released
1-10-2013
Scope extension for
27001:2005 not
permitted
01-01-2014
ISO/IEC 27001:2005
Sunset – no new
applications
accepted
01-05-2015
30-09-15
Completion of
migration to
ISO/IEC 27001:2013
Audit Days required for transition
• Stage 1 review is required to review readiness.
• Audit days required for re-certification audit (per
ISO 27006) shall be used.
• Organization can upgrade to the new standard
during their surveillance audit cycle.
• Organizations must plan for their transition audit
before August 2015.
Any Questions ?