Uploaded by Jep Alvarez

Unlock-02a-27001LI-En-Day1-V4.9.4-20140917EL

advertisement
Schedule for Day 1
Section 01 : Course objective and structure
Section 02 : Standard and regulatory framework
Section 03 : Information Security Management System (ISMS)
Section 04 : Fundamental Principles of Information Security
Section 05 : Initiating the ISMS implementation
Section 06 : Understanding the organization and clarifying the information security objectives
Section 07 : Analysis of the existing management system
© 2005 PECB
Version 4.9.4
Eric Lachapelle (Editor)
Document number: ISMSLID1V4.9.4
Documents provided to participants are strictly reserved for training purposes and are copyrighted by
PECB. Unless otherwise specified, no part of this publication may be, without PECB’s written permission,
reproduced or used in any way or format or by any means whether it be electronic or mechanical including
photocopy and microfilm.
© PECB official training – Reproduction prohibited without authorization
1
Day 1: Introduction to ISO 27001 and initiation of an ISMS
• Section 01 : Course objective and structure
• Section 02 : Standard and regulatory framework
• Section 03 : Information Security Management System (ISMS)
• Section 04 : Fundamental principles of information security
• Section 05 : Initiating the ISMS implementation
• Section 06 : Understanding the organization and clarifying the information security objectives
• Section 07 : Analysis of the existing management system
Pg.: 5
Pg.: 21
Pg.: 41
Pg.: 68
Pg.: 93
Pg.:107
Pg.:137
Day 2: Plan the implementation of the ISMS
• Section 08: Leadership and approval of the ISMS project
• Section 09: ISMS scope
• Section 10: Policies for information security
• Section 11: Risk assessment
• Section 12: Statement of Applicability and management decision to implement the ISMS
• Section 13: Definition of the organizational structure of information security
Pg.: 2
Pg.: 19
Pg.: 36
Pg.: 57
Pg.:120
Pg.:131
Day 3: Deploying the ISMS
• Section 14: Definition of the document management process
• Section 15: Design of security controls and drafting of specific policies & procedures
• Section 16: Communication plan
• Section 17: Training and awareness plan
• Section 18: Implementation of security controls
• Section 19: Incident Management
• Section 20: Operations Management
Pg.: 2
Pg.: 24
Pg.: 39
Pg.: 54
Pg.: 70
Pg.:112
Pg.:129
Day 4: ISMS measurement, continuous improvement and preparation for certification audit
• Section 21: Monitoring, measurement, analysis and evaluation
Pg.: 2
• Section 22: Internal audit
Pg.: 19
• Section 23: Management review
Pg.: 45
• Section 24: Treatment of problems and non-conformities
Pg.: 55
• Section 25: Continual improvement
Pg.: 71
• Section 26: Preparing for the certification audit
Pg.: 81
• Section 27: Competence and evaluation of implementers
Pg.:101
• Section 28: Closing the training
Pg.:122
© PECB official training – Reproduction prohibited without authorization
2
Normative references used in this training
1. Main standards
•
•
•
•
•
•
•
ISO 19011:2011, Guidelines for auditing management systems.
ISO/IEC 27000:2016,
Information technology — Security techniques — Information security
management systems — Overview and vocabulary.
ISO/IEC 27001:2013, Information Security Management Systems – Requirements.
ISO/IEC 27002:2013, Information technology — Security techniques — Code of practice for
information security management.
ISO/IEC 27003:2010, Information technology — Security techniques — Information security
management system implementation guidance.
ISO/IEC 27004:2009, Information technology – Security techniques – Information security management
– Measurement.
ISO/IEC 27005:2011, Information technology — Security techniques — Information security risk
management.
2. Other standard references
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
ISO Guide 73:2009, Risk management – Vocabulary.
ISO 9000:2015, Quality management systems – Fundamentals and vocabulary.
ISO 9001:2015, Quality management systems – Requirements.
ISO 14001:2015, Environmental management systems – Requirements with guidance for use.
ISO/IEC 17011:2004, Conformity assessment – General requirements for accreditation bodies
accrediting conformity assessment bodies.
ISO 17021:2011, Conformity assessment — Requirements for bodies providing audit and certification
of management systems.
ISO 17024:2012, Conformity assessment — General requirements for bodies operating certification of
persons.
OHSAS 18001:2007, Occupational Health and Safety Management Systems — Requirements.
ISO/IEC 20000-1:2011, Information Technology — Service Management. Information technology —
Part 1: Service management system requirements.
ISO/IEC 20000-2:2012, Information technology — Service management — Part 2: Guidance on the
application of service management systems.
ISO 22000:2005, Food safety management systems — Requirements for any organization in the food
chain.
ISO 22301:2012, Societal security — Business continuity management systems — Requirements.
ISO/IEC 27006:2015, Information technology — Security techniques — Requirements for bodies
providing audit and certification of information security management systems.
ISO/IEC 27007:2011, Information technology — Security techniques — Guidelines for information
security management systems auditing.
ISO/IEC TR 27008:2011, Information technology — Security techniques — Guidelines for auditors on
information security controls.
ISO 28000:2007, Specification for security management systems for the supply chain.
ISO 31000:2009, Risk Management – Principles and Guidelines.
ISO/TS 16949:2009, Quality management system—Particular requirements for the application of ISO
9001:2008 for automotive production and relevant service part organizations
© PECB official training – Reproduction prohibited without authorization
3
List of acronyms and abbreviations used in this training
BS: British Standard
BCMS: Business Continuity Management System
CERT: Computer Emergency Response Team
CMS: Content Management System
CobiT: Control Objectives for Business and related Technology
COSO: Committee of Sponsoring Organizations of the Treadway Commission
CPD: Continuing Professional Development
DMS: Document Management System
EA: European Co-operation for Accreditation
EDM: Electronic Document Management System
EMS: Environment management system
FISMA: Federal Information Security Management Act
GAAS: Generally Accepted Auditing Standards
GLBA: Gramm-Leach-Bliley Act
HIPAA: Health Insurance Portability and Accountability Act
IAF: International Accreditation Forum
IFAC: International Federation of Accountants
IMS2: Integrated Implementation Methodology for Management Systems and Standards
ISMS: Information security management system
ISO: International Standards Organization
ITIL: Information Technology Infrastructure Library
LA: Lead Auditor
LI: Lead Implementer
NC: Non-conformity
NIST: National Institute of Standards and Technology
OHSAS: Occupational Health and Safety Assessment Series
OECD: Organization for Economic Co-operation and Development
PCI-DSS: Payment Card Industry Data Security Standard
PDCA: Plan-Do-Check-Act
QMS: Quality management system
PECB: Professional Evaluation and Certification Board
ROI: Return on Investment
ROSI: Return on Security Investment
SMS: Service management system
SoA: Statement of applicability
SOX: Sarbanes-Oxley Act
© PECB official training – Reproduction prohibited without authorization
4
Section 1 : Course objectives and structure
© PECB official training – Reproduction prohibited without authorization
5
Section 1 : Course objectives and structure
To break the ice, participants introduce themselves stating:
•
•
•
•
Name;
Current position;
Knowledge of and experience with information security;
Knowledge of and experience with ISO 27001 and other standards of the 27000 family (27002, 27003,
27004, 27005,...);
• Knowledge and experience with other management systems (ISO 9001, ISO 14001, ISO 20000, ISO
22301, etc.);
• Course expectations and objectives.
Duration of activity: 20 minutes
© PECB official training – Reproduction prohibited without authorization
6
Section 1 : Course objectives and structure
• For simplification, only the masculine is used throughout this training and is not meant to offend
anyone.
• In case of emergency, please be aware of exits.
• Agree on course schedule and two breaks (be on time).
• Set your cell phone on vibration and if you need to take a call, please do it outside the classroom.
• Recording devices are prohibited because they may restrict free discussions.
© PECB official training – Reproduction prohibited without authorization
7
Section 1 : Course objectives and structure
The main objective of this training is to acquire and/or enhance the knowledge and competencies to
participate in the implementation of an Information Security Management System based on ISO 27001.
From an educational view, competency consists of the following 3 elements:
1. Knowledge;
2. Skill;
3. Behavior (attitude).
The training focuses on the acquisition of knowledge necessary for the implementation of a compliance
framework for ISO 27001 and not on the acquisition of expertise in information security. Minimal knowledge
of information security is however required for successful completion of the course.
This training is not intended as a simple list of the prerequisites of the ISO 27001 standard and a high-level
advice on the implementation approach. In addition to presenting the theoretical knowledge needed by an
ISMS project manager, a comprehensive methodology for the implementation is presented. Thus, at the
end of this course, participants will gain knowledge on how to implement a compliance framework for
ISO 27001 and not only on why or what to do.
To obtain more in-depth knowledge of the audit techniques of an ISMS, it is recommended to take the
Certified ISO 27001 Lead Auditor course.
© PECB official training – Reproduction prohibited without authorization
8
Section 1 : Course objectives and structure
The objective of this training is to ensure that on the day following the end of the training, the
candidate can actively participate at the implementation of a compliance framework for ISO 27001.
This training focuses on the reality of conducting a compliance project. The case study and exercises are
used to simulate conditions as close as possible to reality.
Regarding attitude, several exercises will allow the candidate to strengthen his personal qualities necessary
for an implementer to act with due professional care during the implementation such as decision-making
ability, teamwork, openness of mind, etc.
© PECB official training – Reproduction prohibited without authorization
9
Section 1 : Course objectives and structure
This course is primarily based on:
• Trainer lead sessions, where questions are welcomed.
• Student involvement in various ways: exercises, case studies, notes, reactions, discussions (participant
experiences).
Remember, this course is yours: you are the main players of its success.
Students are encouraged to take additional notes. Extra blank pages are available at the end of each day
notes.
Exercises are essential to acquire the skills needed to conduct a the implementation of a management. It is
therefore very important to do them conscientiously. In addition, these exercises prepare students for the
final examination.
© PECB official training – Reproduction prohibited without authorization
10
Section 1 : Course objectives and structure
The objective of the certification examination is to ensure that implementer candidates have mastered
ISMS concepts and techniques so that they are able to participate in ISMS project assignments. The PECB
examination committee shall ensure that the development and adequacy of the exam questions are
maintained based upon current professional practice.
The questions are developed and maintained by a committee of information security specialists that are all
ISO 27001 Lead Implementer certified.
The exam only contains essay questions. The duration of the exam is 3 hours. The minimum
passing score is 70%.
All notes and reference documents may be used during the exam excluding the use of a computer.
The exam is available in several languages. When taking the exam, please ask the trainer or check on the
PECB website to know the list of available languages.
All seven competency domains are covered by the examination. To read a detailed description of each
competency domain, please visit the PECB website.
© PECB official training – Reproduction prohibited without authorization
11
Section 1 : Course objectives and structure
Passing the exam is not the only pre-requisite to obtain the credential of “PECB Certified ISO/IEC
27001 Lead Implementer”. This credential will endorse both the passing the exam and the validation of
the professional experience records. Unfortunately, many people claim they are ISO 27001 Lead
Implementer-qualified following a successful exam, although they don’t have the required experience level.
The set of criteria and the certification process are explained in details at the last day of the
training.
A candidate with lesser experience can apply for the credential of “PECB Certified ISO/IEC 27001
Implementer” or “PECB Certified ISO/IEC 27001 Provisional Implementer”.
Important note: Certification fees are included in the examination price. The candidate will therefore not
have to pay any additional costs when applying for certification at their corresponding experience level, so
as to receive one of the professional credentials: PECB Certified ISO/IEC 27001 Provisional Implementer,
PECB Certified ISO/IEC 27001 Implementer or PECB Certified ISO/IEC 27001 Lead Implementer.
© PECB official training – Reproduction prohibited without authorization
12
Section 1 : Course objectives and structure
After passing the exam, the candidate has a maximum period of three years to apply for one of the
professional credentials related to the ISO 27001 certification scheme.
When the candidate is certified, he will receive, via electronic mail, from PECB a certificate valid for three
years. To maintain his certification, the applicant must demonstrate every year that he is satisfying the
requirements for the assigned credential and abiding to PECB’s Code of Ethics. To learn more about
certificate maintenance and renewal procedure please visit PECB Website. At the end of the training, more
details will be given.
An electronic version (in .PDF) course completion certificate which is valid of 31 CPD (Continuing
Professional Development) credits will be issued (sent via email) to participants after the training.
© PECB official training – Reproduction prohibited without authorization
13
Section 1 : Course objectives and structure
PECB is a certification body for persons, management systems, and products on a wide range of
international standards. As a global provider of training, examination, audit, and certification services,
PECB offers its expertise on multiple fields, including but not limited to Information Security, IT, Business
Continuity, Service Management, Quality Management Systems, Risk & Management, Health, Safety, and
Environment.
We help professionals and organizations to show commitment and competence with internationally
recognized standards by providing this assurance through the education, evaluation and
certiļ¬cation against rigorous, internationally recognized competence requirements. Our mission is
to provide our clients comprehensive services that inspire trust, continual improvement,
demonstrate recognition, and benefit society as a whole. PECB is accredited by IAS against
ISO/IEC 17024, ISO/IEC 17021, ISO/IEC 17065.
The purpose of PECB, as stated in its Bylaws, is to develop and promote professional standards for
certification and to administer credible certification programs for individuals who practice in disciplines
involving the audit and the implementation of a compliant management system. This principal purpose
includes:
1. Establishing the minimum requirements necessary to qualify certified professionals;
2. Reviewing and verifying the qualifications of applicants for eligibility to sit for the certification
examinations;
3. Developing and maintaining reliable, valid, and current certification examinations;
4. Granting certificates to qualified candidates, maintaining certificant records, and publishing a directory
of the holders of valid certificates;
5. Establishing requirements for the periodic renewal of certification and determining compliance with
those requirements;
6. Ascertaining that certificants meet and continue to meet the PECB Code of Ethics;
7. Representing its members, where appropriate, in matters of common interest;
8. Promoting the benefits of certification to employers, public officials, practitioners in related fields, and
the public.
© PECB official training – Reproduction prohibited without authorization
14
Section 1 : Course objectives and structure
The ISO 17024 standard provides a comprehensive framework for certification bodies of persons such
as PECB to operate coherently, comparable and trusted in the world. The primary function of the
certification body of persons is an independent assessment of the demonstrated experience, knowledge
and attitudes of a candidate that are applicable to the field for which certification is granted.
The ISO 17024 standard provides a uniform set of guidelines for organizations that manage the
qualification and certification of persons, including procedures relating to the preparation and updating of
a certification scheme. The standard is designed to help organizations that carry out certification of
persons to conduct well-planned and structured assessments using objective criteria of competencies
and grading to ensure impartiality of operations and reduce the risk of conflict interest.
The ISO 17024 addresses the structure and governance of the certification body, the characteristics of
the certification programme, information that must be made available to candidates and the renewal of
the certification of the certification body.
IAS is one of the largest and most recognized organization to offer an accreditation program to ISO
17024.
© PECB official training – Reproduction prohibited without authorization
15
Section 1 : Course objectives and structure
•
An internationally recognized certification can help you maximize your career
potential and reach you professional objectives.
•
An international certification is the formal recognition of personal competencies in
improving the performance of organizations.
•
According to salary surveys published by the Quality Progress magazine in the last
five years, certified professionals have an average salary considerably higher
than their non-certified counterparts.
© PECB official training – Reproduction prohibited without authorization
16
Section 1 : Course objectives and structure
In order to ensure your satisfaction and continually improve the training, examination and certification
processes, PECB Customer Service has established a support ticket system for handling complaints and
services for our clients.
As a first step, we invite you to discuss the situation with the trainer. If necessary, do not hesitate to contact
the head of the training organization where you are registered. In all cases, we remain at your disposal to
arbitrate any dispute that might arise between you and these parties.
To send comments, questions or complaints, please open a support ticket on PECB’s website in the PECB
Help Center. (www.pecb.com/help)
If you have suggestions for improving PECB’s training materials, we'd like to hear from you. We read and
evaluate the input we get from our members. You can do so directly from our KATE application or you can
open a ticket directed to Training Department the PECB Help Center. (www.pecb.com/help)
In case of dissatisfaction with the training (trainer, training room, equipment,...), the examination or the
certification processes, please open a ticket under “Make a complaint” category on the PECB Help Center.
(www.pecb.com/help)
© PECB official training – Reproduction prohibited without authorization
17
Section 1 : Course objectives and structure
Day 1: Introduction to ISO 27001 and initiation of an ISMS
• Section 01 : Course objective and structure
• Section 02 : Standard and regulatory framework
• Section 03 : Information Security Management System (ISMS)
• Section 04 : Fundamental principles of information security
• Section 05 : Initiating the ISMS implementation
• Section 06 : Understanding the organization and clarifying the information security objectives
• Section 07 : Analysis of the existing management system
Day 2: Plan the implementation of the ISMS
• Section 08: Leadership and approval of the ISMS project
• Section 09: ISMS scope
• Section 10: Policies for information security
• Section 11: Risk assessment
• Section 12: Statement of Applicability and management decision to implement the ISMS
• Section 13: Definition of the organizational structure of information security
© PECB official training – Reproduction prohibited without authorization
18
Section 1 : Course objectives and structure
Day 3: Deploying the ISMS
• Section 14: Definition of the document management process
• Section 15: Design of security controls and drafting of specific policies & procedures
• Section 16: Communication plan
• Section 17: Training and awareness plan
• Section 18: Implementation of security controls
• Section 19: Incident Management
• Section 20: Operations Management
Day 4: ISMS measurement, continuous improvement and preparation for certification audit
• Section 21: Monitoring, measurement, analysis and evaluation
• Section 22: Internal audit
• Section 23: Management review
• Section 24: Treatment of problems and non-conformities
• Section 25: Continual improvement
• Section 26: Preparing for the certification audit
• Section 27: Competence and evaluation of implementers
• Section 28: Closing the training
© PECB official training – Reproduction prohibited without authorization
19
Section 1 : Course objectives and structure
© PECB official training – Reproduction prohibited without authorization
20
Section 2 : Standard and regulatory framework
During this training, we will adopt the following convention: standards will often be referenced as “ISO
XXXX” in the slide instead of their official designation “ISO/IEC XXXXX:20XX” without specifying their
publication date, each referring to its latest version.
ISO documents are copyright protected. Each participant has a responsibility to possess a legal copy of the
standards required for this course. If a standard is included or was given to you for the period of this
training, you must follow the conditions for use stated by ISO.
No part of this publication may be reproduced by any means or use in any way whether it be electronic our
mechanical, including photocopies and microfilms, without written permission from ISO (see address
below) or a member of the ISO organization located in the country of the person of the related organization.
Copies of the different ISO standards can be bought online on the ISO website (www.iso.org) or from the
accreditation authority of each country. For example, you can buy ISO standards from ANSI
(webstore.ansi.org).
Important note on terminology: Depending on the standard, there are different terms used to refer to
specific part of a standard like clause, section, paragraph or chapter. In this course we will use "clause" to
express any reference to a specific part of a norm or standard.
© PECB official training – Reproduction prohibited without authorization
21
Section 2 : Standard and regulatory framework
History
In 1946, delegates from 25 countries met in London and decided to create a new international organization,
of which the object would be "to facilitate the international coordination and unification of industrial
standards". The new organization officially began operations on 23 February 1947, in Geneva, Switzerland.
The International Standards Organization (ISO) is a non-governmental organization that holds a special
position between the public sector and the private sector. Its members include national standards
organizations who often are part of government structures in their countries or who are mandated by these
governments.
Other members belong to the private sector as national partnerships of industry associations.
Goals/Advantages
The role of ISO is to facilitate international coordination and the standardization of industrial standards. To
reach these objectives, ISO publishes technical standards. These standards contribute to the development,
manufacturing and delivery of products and services that are more effective, safer and clearer. They
facilitate fair trade between countries. In addition, they bring a technical foundation for health, security, and
environmental legislation to governments; and they help transfer technologies to developing countries. ISO
standards are also used to protect consumers and general users of products and services. These
standards are also used to simplify their lives.
Note on terminology: Because "International Organization for Standardization" would have different
acronyms in different languages ("IOS" in English, "OIN" in French for Organisation internationale de
normalisation), its founders decided to give it also a short, all-purpose name. They chose "ISO", derived
from the Greek isos, meaning "equal".
Source: www.iso.org
© PECB official training – Reproduction prohibited without authorization
22
Section 2 : Standard and regulatory framework
How ISO standards are developed?
The national delegations of experts of a committee meet to discuss, debate and argue until they reach
consensus on a draft agreement. The “organizations in liaison” also take part in this work. In some cases,
advanced work within these organizations means that substantial technical development and debate has
already occurred, leading to some international recognition and in this case, a document may be submitted
for "fast-track" processing. In both cases, the resulting document is circulated as a Draft International
Standard (DIS) to all ISO's member bodies for voting and comment.
If the voting is in favor, the document, with eventual modifications, is circulated to the ISO members as a
Final Draft International Standard (FDIS). If that vote is positive, the document is then published as an
International Standard. (There is no FDIS stage in the case of documents processed through the fast track
procedure of the joint technical committee ISO/IEC JTC 1, Information technology.)
Every working day of the year, an average of seven ISO technical meetings takes place around the world. In
between meetings, the experts continue the standards' development work by correspondence. Increasingly,
their work is carried out by electronic means, which speeds up the development of standards and cuts travel
costs.
International Standards are developed by a six-step process:
Stage 1: Proposal stage
The first step in the development of an International Standard is to confirm that a particular International
Standard is needed. A new work item proposal (NP) is submitted for vote by the members of the relevant TC
or SC to determine the inclusion of the work item in the programme of work.
The proposal is accepted if a majority of the P-members of the TC/SC votes in favor and if at least five Pmembers declare their commitment to participate actively in the project. At this stage a project leader
responsible for the work item is normally appointed.
Stage 2: Preparatory stage
Usually, a working group of experts, the chairman (convener) of which is the project leader, is set up by the
TC/SC for the preparation of a working draft. Successive working drafts may be considered until the working
group is satisfied that it has developed the best technical solution to the problem being addressed. At this
stage, the draft is forwarded to the working group's parent committee for the consensus-building phase.
Stage 3: Committee stage
As soon as a first committee draft is available, it is registered by the ISO Central Secretariat. It is distributed
for comment and, if required, voting, by the P-members of the TC/SC. Successive committee drafts may be
considered until consensus is reached on the technical content. Once consensus has been attained, the text
is finalized for submission as a draft International Standard (DIS).
Stage 4: Enquiry stage
The draft International Standard (DIS) is circulated to all ISO member bodies by the ISO Central Secretariat
for voting and comment within a period of five months. It is approved for submission as a final draft
International Standard (FDIS) if a two-thirds majority of the P-members of the TC/SC are in favor and not
more than one-quarter of the total number of votes cast are negative. If the approval criteria are not met, the
text is returned to the originating TC/SC for further study and a revised document will again be circulated for
voting and comment as a draft International Standard.
Stage 5: Approval stage
The final draft International Standard (FDIS) is circulated to all ISO member bodies by the ISO Central
Secretariat for a final Yes/No vote within a period of two months. If technical comments are received during
this period, they are no longer considered at this stage, but registered for consideration during a future
revision of the International Standard. The text is approved as an International Standard if a two-thirds
majority of the P-members of the TC/SC is in favor and not more than one-quarter of the total number of
votes cast are negative. If these approval criteria are not met, the standard is referred back to the originating
TC/SC for reconsideration in light of the technical reasons submitted in support of the negative votes
received.
Stage 6: Publication stage
Once a final draft International Standard has been approved, only minor editorial changes, if and where
necessary, are introduced into the final text. The final text is sent to the ISO Central Secretariat which
publishes the International Standard.
Reference: www.iso.org
© PECB official training – Reproduction prohibited without authorization
23
Section 2 : Standard and regulatory framework
ISO basic principles
1. Equal representation: Every ISO member (full-fledged member) has the right to participate in
the development of any standard it deems important to the economy of its country. Whatever the
size or strength of the economy, each participating member can claim their right to vote. ISO
activities are thus carried out in a democratic structure where member countries are on the same
footing in terms of their influence on work orientation.
2. Voluntary: Adoption of ISO standards is voluntary. As a non-governmental organization, ISO
has no legal authority for their implementation. A percentage of ISO standards – more particularly
those related to health, security and the environment – have been adopted in several countries as
part of the regulatory framework, or are mentioned in the legislation for which they act as a
technical basis. Such adoptions are sovereign decisions by regulatory organizations or
governments.
ISO itself does not regulate, or legislate. However, although ISO standards are voluntary, they can
become a market requirement, as is the case with ISO 9001 or with freight container dimensions,
the traceability of food products, etc.
© PECB official training – Reproduction prohibited without authorization
24
Section 2 : Standard and regulatory framework
3. Business orientation: ISO only develops standards for which a market demand exists. Work
is carried out by experts in the related industrial, technical and business sectors. These experts
may be joined by other experts holding the appropriate knowledge such as public organizations,
academic world and testing laboratories. ISO launches the development of new standards in
response to sectors and stakeholders that express a clearly established need for them.
An industry sector or other stakeholder group typically communicates its requirement for a
standard to one of ISO's national members. The latter then proposes the new work item to the
relevant ISO technical committee developing standards in that area. New work items may also be
proposed by organizations in liaison with such committees. When work items do not relate to
existing committees, proposals may also be made by ISO members to set up new technical
committees to cover new fields of activity.
4. Consensus approach: ISO standards are based on a representative consensus approach of
the different stakeholders (experts, industries, researchers, governments, etc.). This ensures a
larger circulation and a greater application. ISO standards are developed by technical
committees, (subcommittees or project committees) comprising experts from the industrial,
technical and business sectors which have asked for the standards, and which subsequently put
them to use. These experts may be joined by representatives of government agencies, testing
laboratories, consumer associations, non-governmental organizations and academic circles.
Proposals to establish new technical committees are submitted to all ISO national member
bodies, who may opt to be participating (P), observer (O) or non-members of the committee. The
secretariat (i.e. the body providing the administrative support to the work of the committee) is
allocated by the Technical Management Board (which itself reports to the ISO Council), usually to
the ISO member body which made the proposal. The secretariat is responsible for nominating an
individual to act as chair of the technical committee. The chair is formally appointed by the
Technical Management Board.
Experts participate as national delegations, chosen by the ISO national member body for the
country concerned. National delegations are required to represent not just the views of the
organizations in which their participating experts work, but those of other stakeholders too.
National delegations are usually based on and supported by national mirror committees to which
the delegations report.
According to ISO rules, the national member body is expected to take account of the views of all
parties interested in the standard under development. This enables them to present a
consolidated, national consensus position to the technical committee.
International and regional organizations from both business and the public sector may apply for
liaison status to participate in developing a standard, or to be informed about the work. Such
“organizations in liaisons” are accepted through voting by the relevant ISO committee. They may
comment on successive drafts, propose new work items or even propose documents for “fast
tracking” , but they have no voting rights.
5. International cooperation: ISO standards are technical agreements that bring, at the
international level, technological compatibility structures. Developing a technical consensus on an
international scale is a major activity. 3 000 technical ISO groups are identified (technical
committees, subcommittees, work groups, etc.) within which 50 000 experts take part in
developing standards annually.
Source: www.iso.org
© PECB official training – Reproduction prohibited without authorization
25
Section 2 : Standard and regulatory framework
1. Customer focus: Organizations depend on their customers and therefore should understand current
and future customer needs, should meet customer requirements and strive to exceed customer
expectations.
Management system implications
• Researching and understanding customer needs and expectations.
• Ensuring that the objectives of the organization are linked to customer needs and expectations.
• Communicating customer needs and expectations throughout the organization.
• Systematically managing customer relationships.
• Ensuring a balanced approach between satisfying customers and other interested parties (such
as owners, employees, suppliers, financiers, local communities and society as a whole).
2. Leadership: Leaders establish unity of purpose and direction of the organization. They should create
and maintain the internal environment in which people can become fully involved in achieving the
organization's objectives.
Management system implications
• Considering the needs of all interested parties including customers, owners, employees,
suppliers, financiers, local communities and society as a whole.
• Establishing a clear vision of the organization's future.
• Setting challenging goals and targets.
• Creating and sustaining shared values, fairness and ethical role models at all levels of the
organization.
• Establishing trust and eliminating fear.
• Providing people with the required resources, training and freedom to act with responsibility and
accountability.
• Inspiring, encouraging and recognizing people's contributions.
© PECB official training – Reproduction prohibited without authorization
26
Section 2 : Standard and regulatory framework
3. Engagement and competence of people: People at all levels are the essence of an organization and their full
involvement enables their abilities to be used for the organization's benefit.
Management system implications
•
•
•
•
•
•
•
People
People
People
People
People
People
People
understanding the importance of their contribution and role in the organization.
identifying constraints to their performance.
accepting ownership of problems and their responsibility for solving them.
evaluating their performance against their personal goals and objectives.
actively seeking opportunities to enhance their competence, knowledge and experience.
freely sharing knowledge and experience.
openly discussing problems and issues.
4. Process approach: A desired result is achieved more efficiently when activities and related resources are
managed as a process.
Management system implications
•
•
•
•
•
•
Systematically defining the activities necessary to obtain a desired result.
Establishing clear responsibility and accountability for managing key activities.
Analyzing and measuring of the capability of key activities.
Identifying the interfaces of key activities within and between the functions of the organization.
Focusing on the factors such as resources, methods, and materials that will improve key activities of the
organization.
Evaluating risks, consequences and impacts of activities on customers, suppliers and other interested
parties.
5. Improvement: Continual improvement of the organization's overall performance should be a permanent objective
of the organization.
Management system implications
•
•
•
•
•
Employing a consistent organization-wide approach to continual improvement of the organization's
performance.
Providing people with training in the methods and tools of continual improvement.
Making continual improvement of products, processes and systems an objective for every individual in the
organization.
Establishing goals to guide, and measures to track, continual improvement.
Recognizing and acknowledging improvements.
6. Informed decision making: Effective decisions are based on the analysis of data and information.
Management system implications
•
•
•
•
Ensuring that data and information are sufficiently accurate and reliable.
Making data accessible to those who need it.
Analyzing data and information using valid methods.
Making decisions and taking action based on factual analysis, balanced with experience and intuition.
7. Relationship management: An organization and its suppliers are interdependent and a mutually beneficial
relationship enhances the ability of both to create value.
Management system implications
•
•
•
•
•
•
•
Establishing relationships that balance short-term gains with long-term considerations.
Pooling of expertise and resources with partners.
Identifying and selecting key suppliers.
Clear and open communication.
Sharing information and future plans.
Establishing joint development and improvement activities.
Inspiring, encouraging and recognizing improvements and achievements by suppliers.
Source: www.iso.org
© PECB official training – Reproduction prohibited without authorization
27
Section 2 : Standard and regulatory framework
Since 1947 ISO has published over 21000 international standards. ISO publishes
standards related to traditional activities such as agriculture and construction, media
devices and the most recent development in information technologies, such as the digital
coding of audiovisual signals for multimedia applications.
ISO 9000 and ISO 14000 families are among the best known ISO standards. The ISO
9000 standard has become an international reference in regard to the quality
requirements in commerce and business transactions. The ISO 14000 standard, for its
part, is used to help organizations meet challenges of an environmental nature.
ISO 9001 is related to quality management. It contains the good practices that aim to
improve customer satisfaction, achievement of customer requirements and regulatory
requirements as well as continuous improvement actions in those fields. In December of
2009, 1 064 785 organizations were ISO 9001 certified (China having the most certified
organizations: 257 076).
ISO 14001 is mainly related to environmental management. It defines the actions that the
organization can implement for the maximum reduction of negative impacts of its
activities on the environment and for the continuous improvement of its environmental
performance. In December 2009, 223 149 organizations were ISO 14001 certified (China
having the most certified organizations: it had in 2009, 55 316; Japan is second with 39
556 certified organizations).
© PECB official training – Reproduction prohibited without authorization
28
Section 2 : Standard and regulatory framework
OHSAS 18001 (OHSAS = Occupational Health and Safety Assessment Series) identifies best
practices for the rigorous management and effective protection of the occupational health and
safety. In spite of the publication of the ISO 18001 standard after various disagreements within
the ISO organization to create a management standard for health and safety, OHSAS 18001 is
the de facto standard for health and safety at the enterprise. OHSAS 18001 is a private norm. It
was developed from existing national standards (BS 8800, UNE 81900, VCA) and standards
published by different certification bodies (OHSMS, SafetyCert, SMS 8800).
ISO 20000-1 defines the requirements that an information technology service provider must
apply. This standard applies to service providers regardless of the organization’s size or type.
The standard consists of two parts. The first part defines the specifications the organization shall
apply to obtain certification. The second part (ISO 20000-2) explains the different practices or
recommendations to reach the objectives previously defined.
ISO 22000 creates and manages a food safety management system (FSMS). This standard
applies to all organizations that are involved in any aspects of the food supply chain and want to
implement a system to continuously provide safe food. This standard focuses on personnel
competencies, continuous information research about food products (new legislations, standards,
rules…). Organizations must perform a HACCP (Hazard Analysis Critical Control Point) to
identify, analyze and evaluate the risks for food safety. For each risk that has been defined as
significant, the organization must define controls to implement.
ISO 22301 defines the requirements that an organization must apply to certify a Business
Continuity Management System (BCMS). To comply with the requirements of this standard the
organization needs to document a model to develop, implement, operate, monitor, review,
maintain and improve a BCMS to increase the resilience of an organization in case of a disaster.
This standard is compatible with PAS 22399 (Guideline for incident preparedness and operational
continuity management) and BS 25999 (British Standard on business continuity).
ISO 27001 defines the requirements that an organization must apply to provide a model for
establishing, implementing, operating, monitoring, reviewing, maintaining and improving an
Information Security Management System (ISMS). An ISMS is a framework of policies and
procedures that includes all legal, physical and technical controls involved in an organization's
information risk management processes. The ISO 27001 standard does not mandate specific
information security controls, but it provides a checklist of controls that should be considered in
the accompanying code of practice, ISO 27002. This second standard describes a
comprehensive set of information security control objectives and a set of generally accepted good
practice security controls.
ISO 28000 prescribes the requirements applicable to a security management system of the
supply chain. An organization has to define, implement, maintain, and improve a supply chain
security management system during each step of production: manufacturing, maintenance,
storage or transport of goods.
© PECB official training – Reproduction prohibited without authorization
29
Section 2 : Standard and regulatory framework
More and more organizations have to manage several compliance frameworks simultaneously. To simplify
the work, to avoid conflicts and to reduce duplication of documents, it is recommended to implement an
integrated management system. An integrated management system (IMS) is a management system which
integrates all components of a business into one coherent system so as to enable the achievement of its
purpose and mission. The table in the slide presents certain requirements that are common to all
management systems.
There are several good reasons for integration, to:
• harmonize and optimize practices
• eliminate conflicting responsibilities and relationships
• balance conflicting objectives
• formalize informal systems
• reduce duplication and therefore costs
• reduce risks and increase profitability
• turn the focus into business goals
• create consistency
• improve communication
• facilitate training and awareness
Important note: In June 2009, the Technical Steering Committee of ISO adopted a resolution asking the
committees involved in the development of standards to specify the requirements of a management system
(ISO 14001, ISO 22000, ISO 27001, etc.) by following a common structure of clauses in line with ISO 9001.
This Directive is applicable to the versions published after 2011. So the common elements to every
management system will have the same reference. The main objective is to facilitate the combined
management of a normative framework for an organization.
© PECB official training – Reproduction prohibited without authorization
30
Section 2 : Standard and regulatory framework
As of March 2012, there are 106 published ISO standards on information security (JTC 1/SC 27 technical
committee) including the following examples:
ISO 9798: This standard specifies a general model including the requirements and constraints for the use
of identity authentication mechanisms. These mechanisms are used in to demonstrate that an entity is who
it claims to be. Details on the different mechanisms are explained in different parts of this standard.
ISO 11770: This standard defines a general model for key management independent of the cryptographic
algorithm used. This standard addresses both the automatic and manual key and the required sequence of
operations. However, it does not specify details on the interface protocols needed for the operations.
ISO 15408: Under the general title Common Criteria, the scope of this standard is the use of it as a basis to
evaluate the security properties of products and systems of Information Technology (IT). A free copy can be
downloaded from the ISO website.
It contains the following parts:
Part 1: Introduction and general model;
Part 2: Security functional components;
Part 3: Security assurance components.
© PECB official training – Reproduction prohibited without authorization
31
Section 2 : Standard and regulatory framework
ISO 21827 specifies the Systems Security Engineering - Capability Maturity Model® (SSECMM®), which describes the essential characteristics of an organization's security engineering
process that must exist to ensure good security. ISO 21827 does not prescribe a particular
process or sequence, but captures practices generally observed in industry. The objective is to
facilitate an increase of maturity of the security engineering processes within the organization.
ISO 24761 specifies the structure and elements of a mechanism for authentication using
biometrics in the verification process.
ISO 27033 provides an overview of network security and related definitions. It defines and
describes the concepts associated with network security. The various parts of ISO 27033 address
specific topics related to network security.
© PECB official training – Reproduction prohibited without authorization
32
Section 2 : Standard and regulatory framework
Beginning of the1990s
• An industry need expressed in terms of better practices and controls to support trade and
government in the implementation and improvement of information security;
• Ministry of Commerce and Industry (United Kingdom) forms a work group grouping together
directors with experience in information security;
• Publication of a collective work of advice on the management of information security.
1992
• Guide of good practices of the industry (September) initially published as a British Standard
Institute (BSI) publication;
• This guide was the basis for the British Standard: BS 7799-1.
1995
• BS 7799-1:1995 published as a British standard.
1996 -1997
• Identification of a need to increase the level of confidence in the BS 7799 standard;
• The industry request a certification programme for an ISMS.
1998
• Launch of the ISMS certification model (Published as BS 7799-2:1998).
1999
• Revision of BS 7799-1:1999 (updates and addition of new security controls):
ļ‚§ New security controls: e-commerce, mobile IT, third-party agreements;
ļ‚§ Suppression of specific references to United Kingdom.
• BS 7799-2:1999 (Alignment of controls to BS7799-1).
© PECB official training – Reproduction prohibited without authorization
33
Section 2 : Standard and regulatory framework
2000
• Publication of ISO 17799:2000.
2002
• Launch of BS 7799-2:2002.
• The main updates are:
ļ‚§ Integration of the Plan-Do-Check-Act (PDCA) Model;
ļ‚§ ISO 17799 controls included as an annex to the standard;
ļ‚§ Annex demonstrating the connection between BS7799-2, ISO 9001 and ISO 14001.
2005
• Publication of the new version of ISO 17799:2005.
• Publication of ISO 27001:2005, which replaces BS7799-2, and contains:
ļ‚§ ISMS specifications;
ļ‚§ ISO 17799 controls in standard annex;
ļ‚§ Annex demonstrating the connection between ISO 9001 and ISO 14001.
2007
• Publication of ISO 27002:2005 replacing ISO 17799:2005 (No change in the content, just identification
number);
• Publication of ISO 27006:2007 (Requirements for bodies providing audit and certification of information security
management systems).
2008
• Publication of ISO 27005:2008 (Information security risk management);
• Publication of ISO 27011:2008 (Information security management guidelines for telecommunications
organizations based on ISO 27002).
2009
• Publication of ISO 27000:2009 (Information security management systems -- Overview and vocabulary);
• Publication of ISO 27004:2009 (Information security management – Measurement);
• Publication of ISO 27033-1:2009 (Network security -- Part 1: Overview and concepts).
2010
• Publication of ISO 27003:2010 (Information security management system implementation guidance);
• Publication of ISO 27033-3:2010 (Network security -- Part 3: Reference networking scenarios -- Threats,
design techniques and control issues).
2011
• Publication of ISO 27005:2011 (Information security risk management);
• Publication of ISO 27006:2011 (Requirements for bodies providing audit and certification of information security
management systems);
• Publication of ISO 27007:2011 (Guidelines for information security management systems auditing);
• Publication of ISO 27008:2011 (Network security -- Part 3: Reference networking scenarios -- Threats, design
techniques and control issues).
2012
• Publication of ISO 27000:2012 (this second edition cancels and replaces the first edition: ISO/IEC 27000:2009)
2013
• Publication of ISO 27001:2013 (this second edition cancels and replaces the first edition: ISO/IEC 27001:2005)
• Publication of ISO 27002:2013 (this second edition cancels and replaces the first edition: ISO/IEC 27002:2005)
2014
• Publication of ISO 27000:2014 (this third edition cancels and replaces the second edition: ISO/IEC 27000:2012)
2016
• Publication of ISO 27000:2016 (this fourth edition cancels and replaces the third edition: ISO/IEC 27000:2014)
© PECB official training – Reproduction prohibited without authorization
34
Section 2 : Standard and regulatory framework
Resulting from International workgroup reflections dedicated to the information security scope,
the ISO 27000 family is progressively published since 2005. ISO 27001:2005 is the only
certifiable standard of the ISO 27000 family. The other standards are guidelines.
• ISO 27000: This information security standard develops the basic concepts as well as the
vocabulary that applies when analyzing Information Security Management Systems. A free
copy of this standard can be downloaded from the ISO website.
• ISO 27001: This information security standard defines the requirements of the Information
Security Management Systems (ISMS).
• ISO 27002 (previously ISO 17799): Guide of best practices for the management of
information security. This standard defines objectives and recommendations in terms of
information security and anticipates meeting global concerns of organizations relating to
information security for their overall activities.
• ISO 27003: Guide for implementing or setting up an ISMS.
• ISO 27004: Guide of metrics to facilitate ISMS management, it provides a method to define
the objectives for implementation and effectiveness criteria, of follow-up and evolution
measurements all through the process.
• ISO 27005: Guide for information security risk management which complies with the
concepts, models and general processes specified in ISO 27001.
• ISO 27006: Guide for organizations auditing and certifying ISMS’s.
• ISO 27007: Guidelines for information security management systems auditing.
• ISO 27008: Guidelines for auditors on information security controls.
• ISO 27011: Guidelines for the use of ISO 27002 in telecommunication industry.
• ISO 27031: Guidelines for information and communication technology readiness for business
continuity.
• ISO 27799: Guidelines for the use of ISO 27002 in health informatics.
© PECB official training – Reproduction prohibited without authorization
35
Section 2 : Standard and regulatory framework
ISO 27001:
• A set of normative requirements for the establishment, implementation, operation, monitoring and
review to update and improve a Information Security Management System (ISMS);
• A set of requirements for selecting security controls tailored to the needs of each organization based on
industry best practices;
• A management system that is integrated in the overall risk framework associated with the activity of the
organization;
• An internationally-recognized process, defined and structured to manage information security;
• An international standard to suit all types of organizations (e.g. commercial enterprises, government
agencies, nonprofit organizations ...), of all sizes in all industries.
ISO 27001, clause 0.1: General
This International Standard has been prepared to provide requirements for establishing, implementing,
maintaining and continually improving an information security management system. The adoption of an
information security management system is a strategic decision for an organization. The establishment and
implementation of an organization’s information security management system is influenced by the
organization’s needs and objectives, security requirements, the organizational processes used and the size
and structure of the organization. All of these influencing factors are expected to change over time.
The information security management system preserves the confidentiality, integrity and availability of
information by applying a risk management process and gives confidence to interested parties that risks
are adequately managed.
It is important that the information security management system is part of and integrated with the
organization’s processes and overall management structure and that information security is considered in
the design of processes, information systems, and controls. It is expected that an information security
management system implementation will be scaled in accordance with the needs of the organization.
This International Standard can be used by internal and external parties to assess the organization’s ability
to meet the organization’s own information security requirements.
© PECB official training – Reproduction prohibited without authorization
36
Section 2 : Standard and regulatory framework
ISO 27002:
• Revised in 2005, ISO 17799 is a guide of best practices information security management. In 2007, it
became ISO 27002 to be integrated into the ISO 27000 family. In 2013, a second edition of ISO 27002
is published.
• This international standard provides a list of security objectives and controls generally practiced in the
industry.
• In particular Clauses 5 to 18 provide specific advice and an implementation guide related to the best
practices to support the controls specified in Annex A of ISO 27001 (clause A.5 to A .18).
ISO 27002, clause 1: Scope
This International Standard gives guidelines for organizational information security standards and
information security management practices including the selection, implementation and management of
controls taking into consideration the organization’s information security risk environment(s).
This International Standard is designed to be used by organizations that intend to:
a) select controls within the process of implementing an Information Security Management System based
on ISO/IEC 27001;
b) implement commonly accepted information security controls;
c) develop their own information security management guidelines.
© PECB official training – Reproduction prohibited without authorization
37
Section 2 : Standard and regulatory framework
ISO 27003, clause 1 : Scope
This International Standard focuses on the critical aspects needed for successful design and
implementation of an Information Security Management System (ISMS) in accordance with ISO/IEC
27001:2005. It describes the process of ISMS specification and design from inception to the production of
implementation plans. It describes the process of obtaining management approval to implement an ISMS,
defines a project to implement an ISMS (referred to in this International Standard as the ISMS project), and
provides guidance on how to plan the ISMS project, resulting in a final ISMS project implementation plan.
This International Standard is intended to be used by organizations implementing an ISMS. It is applicable
to all types of organization (e.g. commercial enterprises, government agencies, non-profit organizations) of
all sizes. Each organization's complexity and risks are unique, and its specific requirements will drive the
ISMS implementation. Smaller organizations will find that the activities noted in this International Standard
are applicable to them and can be simplified. Large-scale or complex organizations might find that a
layered organization or management system is needed to manage the activities in this International
Standard effectively. However, in both cases, the relevant activities can be planned by applying this
International Standard. This International Standard gives recommendations and explanations; it does not
specify any requirements.
This International Standard is intended to be used in conjunction with ISO/IEC 27001:2005 and ISO/IEC
27002:2005, but is not intended to modify and/or reduce the requirements specified in ISO/IEC 27001:2005
or the recommendations provided in ISO/IEC 27002:2005. Claiming conformity to this International
Standard is not appropriate.
© PECB official training – Reproduction prohibited without authorization
38
Section 2 : Standard and regulatory framework
Here are some of the standards already published or under development:
• ISO 27010: Information security management guidelines for inter-sector communication;
• ISO 27011: Information security management guidelines for telecommunications organizations
based on ISO 27002;
• ISO 27013: Guideline on the integrated implementation of ISO 20000-1 and ISO 27001;
• ISO 27014: Information security governance framework;
• ISO 27015: Information security management guidelines for the finance and insurance sectors;
• ISO 27016: Information security management guidelines on organizational economics;
• ISO 27017: Information security management guidelines on cloud computing security and privacy
management system;
• ISO 27018: Code of practice for data protection controls for public cloud computing services;
• ISO 27031: Guideline for ICT readiness for business continuity (essentially the ICT continuity
component within business continuity management);
• ISO 27032: Guidelines for cyber security;
• ISO 27033: IT Network security (ISO 27033-1 to ISO 27033-7);
• ISO 27034: Guideline for application security;
• ISO 27035: Security incident management;
• ISO 27036: Guidelines for security of outsourcing;
• ISO 27037: Guidelines for identification, collection and/or acquisition and preservation of digital
evidence;
• ISO 27038: Specification for Digital Redaction;
• ISO 27039: Guideline for selection, deployment and operations of intrusion detection systems;
• ISO 27040: Guideline for storage security;
• ISO 27041: Guidance on assuring suitability and adequacy of investigation methods;
• ISO 27042: Guidelines for the analysis and interpretation of digital evidence;
• ISO 27043: Guideline for investigation principles and processes;
• ISO 29100: Information technology privacy framework.
© PECB official training – Reproduction prohibited without authorization
39
Section 2 : Standard and regulatory framework
© PECB official training – Reproduction prohibited without authorization
40
Section 3: Information Security Management System (ISMS)
© PECB official training – Reproduction prohibited without authorization
41
Section 3: Information Security Management System (ISMS)
A management system is a system that allows organizations to establish policies and objectives and to
subsequently implement them. The management system of an organization may include different
management systems, such as a quality management system, information security, environmental, etc.
Organizations use management systems to develop their policies and put them into effect through
objectives using:
• An organizational structure;
• Systematic processes and associated resources;
• An effective assessment methodology;
• A review process to ensure that the problems are adequately corrected and that opportunities for
improvement are recognized and implemented when justified.
Note: What is implemented must be controlled and measured, what is controlled and measured
must be managed. The standard indicates that the organization must evaluate the information security
performance and the effectiveness of the information security management system (clause 9.1). This
clause is an essential component of a management system because without the evaluation of the
effectiveness of processes and controls in place, it is impossible to validate if the organization has achieved
its objectives.
© PECB official training – Reproduction prohibited without authorization
42
Section 3: Information Security Management System (ISMS)
Definitions related to the concept of “ISMS”
ISO 9000 and ISO 27000
•
System: Set of interrelated or interacting elements (ISO 9000, 3.5.1).
•
Management: Coordinated activities to direct and control an organization (ISO 9000,
3.3.3).
•
Management system: set of interrelated or interacting elements of an organization to
establish policies and objectives, and processes to achieve those objectives (ISO 9000,
3.5.3).
•
Information security: Preservation of confidentiality, integrity and availability of information
(ISO 27000, 2.33).
Notes on terminology
1. The term management refers to all the activities that are used to coordinate, direct, and
control an organization. In this context, the term management does not refer to people. It
refers to activities. ISO 9000 uses the term top management to refer to people.
2. The management system of an organization can include different management systems,
such as a quality management system (ISO 9001), the information security management
system (ISO 27001), an environmental management system (ISO 14001, etc..)..
© PECB official training – Reproduction prohibited without authorization
43
Section 3: Information Security Management System (ISMS)
This international standard adopts the process model “Plan-Do-Check-Act” (PDCA) or the Deming wheel
which is applied to the structure of all the processes in an management system. The figure illustrates how
an management system uses as input the requirements and the expectations of the stakeholders, and how
it produces, with the necessary actions and processes, the information security results that meet the
requirements and expectations.
Plan (establish the management system): Establish the policy, the objectives, processes and procedures
related to risk management and the improvement of information security to provide results in line with the
global policies and objectives of the organization.
Do (implement and operate the management system): Implement and operate the policy, controls,
processes and procedures of the management system.
Check (monitor and review the management system): Assess and, if applicable, measure process
performances against the policy, objectives and practical experience and report the results to management
for review.
Act (maintain and improve the management system): Undertake corrective and preventive actions, on
the basis of the results of the internal audit and management review, or other relevant information to
continually improve the said system.
© PECB official training – Reproduction prohibited without authorization
44
Section 3: Information Security Management System (ISMS)
Processes can be defined as being a logical group of interrelated tasks, performed to reach an defined
objective. A process is a sequence of structured and measured activities designed to create a product or a
service for a specific market or a particular client.
For an organization to function effectively, it must implement and manage numerous interrelated and
interactive processes. Often, the output element of a process directly forms the input element to the next
process. The identification and orderly management of processes within an organization and especially the
interactions of these processes are called "process approach“.
Controls are used to ensure that the conduct of the business processes is performed in a secure
manner in terms of information exchange. These security processes and controls are dependent of the
business processes because they are part of it.
For example, security measures relating to human resources should be integrated into existing processes
for human resources management of an organization by making these processes more secure by providing
that:
• Everyone’s responsibilities in terms of information security be defined (clause 5.3);
• Background checks of applicants be performed according to the criticality of the information they will
have to process (clause A.7.1.1);
• The organization has a formal disciplinary process in case of a breach in information security (clause
A.7.2.3);
• The organization has a formalized process to remove the access rights of employees leaving the
organization (clause A.9.2.6).
© PECB official training – Reproduction prohibited without authorization
45
Section 3: Information Security Management System (ISMS)
An organization seeking certification to ISO 27001 must comply with all terms defined in sections 4 to 10 of
the standard, define, in the statement of applicability, the applicable controls and justify the inapplicable
controls of Annex A.
© PECB official training – Reproduction prohibited without authorization
46
Section 3: Information Security Management System (ISMS)
ISO 27001, Clause 4.1: Understanding the organization and its context
The organization shall determine external and internal issues that are relevant to its purpose and that affect
its ability to achieve the intended outcome(s) of its information security management system.
Note: Determining these issues refers to establishing the external and internal context of the organization
considered in Clause 5.3 of ISO 31000:2009
ISO 27001, Clause 4.2: Understanding the needs and expectations of interested parties
The organization shall determine:
a) interested parties that are relevant to the information security management system; and
b) the requirements of these interested parties relevant to information security.
Note: The requirements of interested parties may include legal and regulatory requirements and contractual
obligations.
© PECB official training – Reproduction prohibited without authorization
47
Section 3: Information Security Management System (ISMS)
ISO 27001, Clause 4.3: Determining the scope of the information security management
system
The organization shall determine the boundaries and applicability of the information security
management system to establish its scope.
When determining this scope, the organization shall consider:
a) the external and internal issues referred to in 4.1;
b) the requirements referred to in 4.2; and
c) interfaces and dependencies between activities performed by the organization, and those that
are performed by other organizations.
The scope shall be available as documented information
ISO 27001, Clause 4.4: Information security management system
The organization shall establish, implement, maintain and continually improve an information
security management system, in accordance with the requirements of this International Standard.
© PECB official training – Reproduction prohibited without authorization
48
Section 3: Information Security Management System (ISMS)
ISO 27001, clause 5.1 Leadership and commitment
Top management shall demonstrate leadership and commitment with respect to the information security
management system by:
a) ensuring the information security policy and the information security objectives are established and are
compatible with the strategic direction of the organization;
b) ensuring the integration of the information security management system requirements into the
organization’s processes;
c) ensuring that the resources needed for the information security management system are available;
d) communicating the importance of effective information security management and of conforming to the
information security management system requirements;
e) ensuring that the information security management system achieves its intended outcome(s);
f) directing and supporting persons to contribute to the effectiveness of the information security
management system;
g) promoting continual improvement; and
h) supporting other relevant management roles to demonstrate their leadership as it applies to their areas
of responsibility.
© PECB official training – Reproduction prohibited without authorization
49
Section 3: Information Security Management System (ISMS)
Through its leadership and actions, management can create an environment in which different actors are
fully involved and in which the management system can operate effectively in synergy with the objectives of
the organization. Management can use the management principles of ISO to define its role, which involves:
a) establish guidelines and objectives of the organization;
b) promote policies and objectives at all levels of the organization to increase awareness, motivation and
involvement;
c) ensure that the requirements of stakeholders (customers, partners, shareholders, legislators, etc.) are
a priority at all levels of the organization;
d) ensuring that appropriate processes and controls are implemented to help meet the requirements of
customers and other stakeholders;
e) ensuring that an efficient and effective management system is established, implemented and
maintained;
f)
ensuring the availability of necessary resources;
g) assurance that internal audits are conducted;
h) conduct the management review at least once a year;
i)
decide on actions concerning the policy and objectives;
j)
decide on actions to improve the management system.
© PECB official training – Reproduction prohibited without authorization
50
Section 3: Information Security Management System (ISMS)
© PECB official training – Reproduction prohibited without authorization
51
Section 3: Information Security Management System (ISMS)
© PECB official training – Reproduction prohibited without authorization
52
Section 3: Information Security Management System (ISMS)
The organization that wants to plan an ISMS must consider the issues referred to in 4.1 (Understanding the
organization and its context) and the requirements referred to in 4.2. (Understanding the needs and
expectations of interested parties) and determine the risks and opportunities that need to be addressed
© PECB official training – Reproduction prohibited without authorization
53
Section 3: Information Security Management System (ISMS)
ISO 27001, clause 7: Support
7.1 Resources
The organization shall determine and provide the resources needed for the establishment, implementation,
maintenance and continual improvement of the ISMS.
7.2 Competence
The organization shall
a) determine the necessary competence of person(s) doing work under its control that affects its
information security performance,
b) ensure that these persons are competent on the basis of appropriate education, training, and
experience,
c) where applicable, take actions to acquire the necessary competence, and evaluate the effectiveness
of the actions taken, and
d) retain appropriate documented information as evidence of competence.
NOTE Applicable actions can include, for example: the provision of training to, the mentoring of, or the
reassignment of current employed persons; or the hiring or contracting of competent persons.
7.3 Awareness
Persons doing work under the organization’s control shall be aware of:
a) the information security policy,
b) their contribution to the effectiveness of the ISMS, including the benefits of improved information
security performance,
c) the implications of not conforming with the ISMS requirements
© PECB official training – Reproduction prohibited without authorization
54
Section 3: Information Security Management System (ISMS)
7.4 Communication
The organization shall determine the need for internal and external communications relevant to the ISMS
including
a) on what it will communicate,
b) when to communicate,
c) with whom to communicate,
d) who shall communicate; and
e) the processes by which communication shall be effected.
7.5 Documented information
7.5.1 General
The organization’s ISMS shall include:
− documented information required by this International Standard; and
− documented information determined by the organization as being required for the effectiveness of the
ISMS.
NOTE The extent of documented information for a ISMS can differ from one organization to another due to
− the size of organization and its type of activities, processes, products and services,
− the complexity of processes and their interactions, and
− the competence of persons.
© PECB official training – Reproduction prohibited without authorization
55
Section 3: Information Security Management System (ISMS)
ISO 27001, clause 7.5: Documented information
7.5.2 Creating and updating
When creating and updating documented information, the organization shall ensure appropriate
a) identification and description (e.g. a title, date, author or reference number),
b) format (e.g. language, software version, graphics) and media (e.g. paper, electronic),
c) and review and approval for suitability and adequacy.
7.5.3 Control of documented information
Documented information required by the ISMS and by this International Standard shall be controlled to ensure:
a) it is available and suitable for use, where and when it is needed,
b) it is adequately protected (e.g. from loss of confidentiality, improper use, or loss of integrity).
For the control of documented information, the organization shall address the following activities, as applicable:
— distribution, access, retrieval and use,
— storage and preservation, including preservation of legibility,
— control of changes (e.g. version control),
— retention and disposition
Documented information of external origin determined by the organization to be necessary for the planning and
operation of the ISMS shall be identified, as appropriate, and controlled.
NOTE Access implies a decision regarding the permission to view the documented information, or the
permission and authority to view and change the documented information, etc.
© PECB official training – Reproduction prohibited without authorization
56
Section 3: Information Security Management System (ISMS)
© PECB official training – Reproduction prohibited without authorization
57
Section 3: Information Security Management System (ISMS)
ISO 27001, clause 8.2: Information security risk assessment
The organization shall perform information security risk assessments at planned intervals or when
significant changes are proposed or occur, taking account of the criteria established in 6.1.2 a).
The organization shall retain documented information of the results of the information security risk
assessments.
ISO 27001, clause 8.3: Information security risk treatment
The organization shall implement the information security risk treatment plan. The organization shall retain
documented information of the results of the information security
risk treatment.
© PECB official training – Reproduction prohibited without authorization
58
Section 3: Information Security Management System (ISMS)
ISO 27001, clause 9: Performance evaluation
9.1 Monitoring, measurement, analysis and evaluation
The organization shall evaluate the information security performance and the effectiveness of the
information security management system.
The organization shall determine:
a) what needs to be monitored and measured, including information security processes and controls;
b) the methods for monitoring, measurement, analysis and evaluation, as applicable, to ensure valid
results;
NOTE The methods selected should produce comparable and reproducible results to be considered
valid.
c) when the monitoring and measuring shall be performed;
d) who shall monitor and measure;
e) when the results from monitoring and measurement shall be analysed and evaluated; and
f) who shall analyse and evaluate these results.
The organization shall retain appropriate documented information as evidence of the monitoring and
measurement results.
© PECB official training – Reproduction prohibited without authorization
59
Section 3: Information Security Management System (ISMS)
Internal audits are used to assess the level of fulfillment of the requirements of the standard relating to the
management system. Regular internal audit activities allow assessing continuously the effectiveness of the
management system and identifying opportunities for improvement.
The organization must implement an internal audit programme to determine if the management system
reaches the defined objectives of the organization, remains conform to the standard as well to other
internal, legal, regulatory and contractual requirements and is kept up-to-date in an efficient manner.
The audit program shall, as a minimum, contain:
1. Definition of the criteria, the scope, the frequency, the methods and the audit procedures;
2. Definition of the roles and responsibilities of the internal auditors;
3. Documentation ensuring the objectivity and impartiality of the audit process (examples: audit chart,
work contract, code of ethics of internal auditors, etc.);
4. Planning of audit activities;
5. Follow-up activities to audit the business actions following the detection of non conformities;
6. Procedure to keep the records of audit activities and safekeeping of records.
Note: The implementation and management of an internal audit program will be explained during Day 4 of
the training.
© PECB official training – Reproduction prohibited without authorization
60
Section 3: Information Security Management System (ISMS)
Management reviews allow the management of the organization to periodically review the level of
performance (relevance, appropriateness, effectiveness and efficiency) of the management system in
place. These reviews allow the organization to adapt or refocus quickly and efficiently the management
system towards internal or external changes. A management review shall be organized at least once
a year.
Management reviews must be documented. They should then be distributed to all review participants.
© PECB official training – Reproduction prohibited without authorization
61
Section 3: Information Security Management System (ISMS)
ISO 27001, clause 10: Improvement
10.1 Nonconformity and corrective action
When a nonconformity occurs, the organization shall:
a) react to the nonconformity, and as applicable:
1) take action to control and correct it; and
2) deal with the consequences;
b) evaluate the need for action to eliminate the causes of nonconformity, in order that it does not recur or
occur elsewhere, by:
1) reviewing the nonconformity;
2) determining the causes of the nonconformity; and
3) determining if similar nonconformities exist, or could potentially occur;
c) implement any action needed;
d) review the effectiveness of any corrective action taken; and
e) make changes to the information security management system, if necessary.
Corrective actions shall be appropriate to the effects of the nonconformities encountered.
The organization shall retain documented information as evidence of:
f) the nature of the nonconformities and any subsequent actions taken, and
g) the results of any corrective action.
ISO 27000 - Definitions
2.24. Effectiveness: Extent to which planned activities are realized and planned results achieved.
© PECB official training – Reproduction prohibited without authorization
62
Section 3: Information Security Management System (ISMS)
The objectives and the security controls listed in Annex A are aligned with the security objectives and
security controls listed in the various clauses of ISO 27002, clauses 5 to 18.
The lists of objectives and security controls contained in Annex A of ISO 27001 are not exhaustive. An
organization may consider to include additional security objectives and security controls.
© PECB official training – Reproduction prohibited without authorization
63
Section 3: Information Security Management System (ISMS)
© PECB official training – Reproduction prohibited without authorization
64
Section 3: Information Security Management System (ISMS)
Please read the following parts of the case study provided for this course:
•
•
History of the business enterprise
Organization of the business enterprise
Basing yourself on this information, determine and explain the three greatest advantages for implementing
the ISO 27001 standard for this organization and how they can measure these advantages thanks to
metrics.
Duration of the exercise: 30 minutes
Comments: 15 minutes
© PECB official training – Reproduction prohibited without authorization
65
Section 3: Information Security Management System (ISMS)
Improvement of security:
• General improvement of the effectiveness of information security;
• The standard covers both the technological aspects of security as the other aspects: corporate
security, physical security, etc.
• Independent review of your information security management system;
• Better awareness to information security;
• Mechanisms to measure the effectiveness of the management system.
Good governance:
• Awareness and empowerment of personnel regarding information security;
• Decrease of lawsuit risks against upper management in virtue of the ‘‘due care’’ and the ‘‘due
diligence’’ principles;
• The opportunity to identify the weaknesses of the ISMS and to provide corrections;
• Increase of the accountability of top management for information security.
Conformity:
• To other ISO standards;
• To OECD (Organization for Economic Co-operation and Development) principles (see ISO 27001,
Annex B);
• To industry standards, example: PCI-DSS (Payment Card Industry Data Security Standard), Basel II
(for banking industry);
• To national and regional laws.
Cost reduction:
• Decision makers often ask to justify the profitability of projects and demand concrete and
measurable return-benefits. A new financial evaluation concept has emerged to treat specifically the
information security field: Return on Security Investment (ROSI). ROSI is a concept derived from
Return on Investment (ROI). It can be interpreted as the security project’s financial profit taking into
account its total cost over a given period of time.
Marketing:
• Differentiation provides a competitive advantage for the organization;
• Satisfaction of requirements of customer and/or other stakeholders;
• Consolidating confidence of customers, suppliers and partners of the organization.
© PECB official training – Reproduction prohibited without authorization
66
Section 3: Information Security Management System (ISMS)
© PECB official training – Reproduction prohibited without authorization
67
Section 4: Fundamental principles of information security
© PECB official training – Reproduction prohibited without authorization
68
Section 4: Fundamental principles of information security
Information system: Collection of material, software and organizational ways that allow to receive, store
and process information
Clause 8 of Annex A defines the objectives for the security control linked to the management of assets.
ISO 27001, A.8.1 - Responsibility for assets
Objective: To identify organizational assets and define appropriate protection responsibilities.
A.8.1.1 Inventory of assets
Control: Assets associated with information and information processing facilities shall be identified and an
inventory of these assets shall be drawn up and maintained.
A.8.1.2 Ownership of assets
Control: Assets maintained in the inventory shall be owned.
A.8.1.3 Acceptable use of assets
Control: Rules for the acceptable use of information and of assets associated with information and
information processing facilities shall be identified, documented and implemented.
A.8.1.4 Return of assets
Control: All employees and external party users shall return all of the organizational assets in their
possession upon termination of their employment, contract or agreement.
© PECB official training – Reproduction prohibited without authorization
69
Section 4: Fundamental principles of information security
Note:
• The medium of a document can be paper, magnetic, electronic or optical computer
disc, photograph or a combination of these.
• A set of documents (for example specifications and records) is frequently called
documentation.
It is important to make the difference between documents and records. In dictionaries, a
record is a type of document, but in the ISO world, these are distinct concepts. A record
is the output of a process or control. As an example:
1. An audit procedure is a document. This procedure generates audit report and these
audit reports become records.
2. A documented process for management reviews is a document. This process
generates records such as management review minutes.
3. A documented procedure for continuous improvement is a document. A filled
corrective action form is a record.
© PECB official training – Reproduction prohibited without authorization
70
Section 4 : Fundamental principles of information security
ISO 27002, clause 0.2: How to establish security requirements
It is essential that an organization identifies its security requirements. There are three main
sources of security requirements:
a) assessing risks to the organization, taking into account the organization’s overall business
strategy and objectives. Through a risk assessment, threats to assets are identified, vulnerability
to and likelihood of occurrence is evaluated and potential impact is estimated;
b) legal, statutory, regulatory and contractual requirements that an organization, its trading
partners, contractors and service providers have to satisfy, and their socio-cultural environment;
c) set of principles, objectives and business requirements for information handling, processing,
storing, communicating and archiving that an organization has developed to support its
operations.
Resources employed in implementing controls need to be balanced against the business harm
likely to result from security issues in the absence of those controls. The results of a risk
assessment will help guide and determine the appropriate management action and priorities for
managing information security risks and for implementing controls selected to protect against
these risks.
ISO/IEC 27005 provides information security risk management guidance, including advice on risk
assessment, risk treatment, risk acceptance, risk communication, risk monitoring and risk review.
© PECB official training – Reproduction prohibited without authorization
71
Section 4: Fundamental principles of information security
Other definitions of ISO 27000
2.8. Authenticity: Property that an entity is what it claims to be.
2.54. Non-repudiation: Ability to prove the occurrence of a claimed event or action and its originating
entities
2.62. Reliability: Property of consistent intended behaviour and results
© PECB official training – Reproduction prohibited without authorization
72
Section 4: Fundamental principles of information security
ISO 27001 is an information security standard. This means it applies to the protection of information
whatever its type, whether it is numeric, paper or human.
Annex A includes control objectives related to the classification of information:
ISO 27001, A8.2 – Information classification
Objective: To ensure that information receives an appropriate level of protection in accordance with its
importance to the organization.
A8.2.1 Classification of information
Control: Information shall be classified in terms of legal requirements, value, criticality and sensitivity to
unauthorised disclosure or modification.
A8.2.2 Labelling of information
Control: An appropriate set of procedures for information labelling shall be developed and implemented in
accordance with the information classification scheme adopted by the organization.
A8.2.3 Handling of assets
Control: Procedures for handling assets shall be developed and implemented in accordance with the
information classification scheme adopted by the organization.
© PECB official training – Reproduction prohibited without authorization
73
Section 4: Fundamental principles of information security
Confidentiality: Ensure that the information is only accessible to authorized individuals (individuals with a
real need).
For example, the personal data of salaried employees must only be accessible to authorized Human
Resources Department personnel.
Several types of access control can ensure the confidentiality of information. Encryption is an example of
such an access control. It can be used to protect the confidentiality of information. Access controls can be
applied at different levels of an information security management system:
• At the physical level (example: locks on doors, filing cabinets that lock, safes etc.)
• At the logical level (example: access controls to information)
© PECB official training – Reproduction prohibited without authorization
74
Section 4: Fundamental principles of information security
Integrity: Data must be complete and intact.
For example: Accounting data must comply with reality (complete and exact). The exactness is translated
by the absence of alterations in the information.
Many devices manipulating data, including disk drives and other media as well as telecommunications
systems contain devices for automatic data integrity verification. Data integrity controls are essential in
operating systems, software and applications. They allow to avoid intentional or involuntary corruption of
programs and data.
Integrity controls must be included in the procedures. These contribute to the reduction in the risk of error,
theft or fraud. Data validation controls, user training as well as certain controls at the operational level are
good examples of this.
© PECB official training – Reproduction prohibited without authorization
75
Section 4: Fundamental principles of information security
Availability: Information must be easily accessible by individuals who need it.
For example, data related to customers must be accessible to the marketing department.
In practice, availability of information requires a control system such as, for example, the backup of data,
capacity planning, procedures and criteria for approval of the systems, the incident management
procedures, the management of removable media, the information processing procedures, the
maintenance and testing of equipments, continuity concept procedures as well as the procedures to control
the usage of systems.
© PECB official training – Reproduction prohibited without authorization
76
Section 4: Fundamental principles of information security
The vulnerability assessment can be complicated by a common misperception that weaknesses or
shortcomings are always associated with negative characteristics. Many vulnerabilities are indeed negative
characteristics as in an information system where the "patches" are not updated.
But, in the case of other vulnerabilities, weakness may be associated with positive characteristics that could
have undesirable side effects. For example, the mobility of laptops is a desirable benefit for which you pay
a higher price, but one advantage that makes them more likely to be stolen.
The vulnerabilities can be intrinsic or extrinsic. The intrinsic vulnerabilities are related to the inherent
characteristics of the assets. The extrinsic vulnerabilities are related to characteristics of specific
circumstances of the asset. For example, a server that has no capacity to process data is a victim of
intrinsic vulnerability and if this server is in a basement in a flood zone, it undergoes extrinsic vulnerability.
© PECB official training – Reproduction prohibited without authorization
77
Section 4: Fundamental principles of information security
Annex D of ISO 27005 provides a typology for classification of vulnerabilities which we could use in
principle. However, this list of vulnerabilities should be used with caution. This list is not complete as new
vulnerabilities occur regularly due to, among others, evolution and changes in technology.
One must use Annex D as a guide or reminder to help organize and structure the collection and collation of
relevant data on vulnerabilities rather than as a checklist to follow blindly.
© PECB official training – Reproduction prohibited without authorization
78
Section 4: Fundamental principles of information security
By definition, a threat has the potential to harm assets such as information, processes and systems and so
therefore harm the organizations. It is associated with the negative aspect of risk. The nature of the threat
induces it is always undesirable.
In interviews, simple language should be used to facilitate the discussion on the threats. For example, one
can ask stakeholders for which events they wish to preserve the resources of the organization and provide
for this purpose a list of examples.
© PECB official training – Reproduction prohibited without authorization
79
Section 4: Fundamental principles of information security
Annex C of ISO 27005 provides a typology for classification of threats. We should use the list of threats with
caution. This list is not complete, and cannot claim to be exhaustive, since new threats occur regularly due
to, among others, technologies and capabilities of threat agents are evolving.
We must use Annex C as a guide or checklist to help organize and structure the collection and collation of
relevant data on threats rather than as a checklist to follow blindly.
© PECB official training – Reproduction prohibited without authorization
80
Section 4: Fundamental principles of information security
In itself, the presence of a vulnerability does not produce damage, a threat must exist to exploit it. A
vulnerability that doesn’t correspond to a threat may not require the set up of a control, but it must be
identified and monitored in case of changes.
Note that the incorrect implementation, use or malfunction of a control could, in itself, represent a threat. A
control can be effective or ineffective based on the environment in which it operates. On the other hand, a
threat that is not vulnerable cannot represent a risk.
© PECB official training – Reproduction prohibited without authorization
81
Section 4: Fundamental principles of information security
Here is a list of several potential impacts (see ISO 27005, Annex B.2) that can affect either availability,
integrity, confidentiality or a combination of any:
01.Financial losses;
02.Loss of assets or of their value;
03.Loss of customers, loss of suppliers;
04.Lawsuits and penalties;
05.Loss of competitive advantage;
06.Loss of technological advantage;
07.Loss of efficiency or effectiveness;
08.Violation of the privacy of users or customers;
09.Service interruption;
10.Inability to provide service;
11.Loss of branding or reputation;
12.Disruption of operations;
13.Disruption or third party operations (suppliers, customers…);
14.Inability to fulfill legal obligations;
15.Inability to fulfill contractual obligations;
16.Endangering safety of staff, users.
© PECB official training – Reproduction prohibited without authorization
82
Section 4: Fundamental principles of information security
ISO 27000 - Definitions
2.64. Residual risk: The risk remaining after risk treatment.
2.69. Risk acceptance: Informed decision to take a particular risk.
2.70. Risk analysis: process to comprehend the nature of risk and to determine the level of risk
2.71. Risk assessment: Overall process of risk identification, risk analysis and risk evaluation.
2.74. Risk evaluation: Process of comparing the the results of risk analysis with risk criteria to determine
whether the risk and/or its magnitude is acceptable or tolerable
2.76. Risk management: Coordinated activities to direct and control an organization with regard to risk.
2.79. Risk treatment: Process to modify risk.
© PECB official training – Reproduction prohibited without authorization
83
Section 4: Fundamental principles of information security
1. Technical control: Controls related to the use of technical measures or technologies such as
firewalls, alarm systems, surveillance cameras, intrusion detection systems (IDS), etc.
2. Administrative control: Controls related to organizational structure such as segregation of duties,
jobs rotation, job descriptions, approval processes, etc.
3. Managerial controls: Controls related to the management of personnel, including training and
coaching of employees, management reviews and audits.
4. Legal control: Controls related to the applications of a legislation, regulatory requirements or
contractual obligations.
Note:
• An administrative control is more related to the structure of the organization as a whole without being
applied by a particular person, while a managerial control is to be applied by managers.
• The differences between the types of security controls are explained only for understanding. An
organization does not need to qualify the nature of the security controls it implements.
© PECB official training – Reproduction prohibited without authorization
84
Section 4: Fundamental principles of information security
ISO 27000, clause 2.17.
Control objective: Statement describing what is to be achieved as a result of implementing controls.
ISO 27000, clause 2.16.
Control: measure that is modifying risk [SOURCE: ISO Guide 73:2009, 3.8.1.1]
Note 1 to entry: Controls include any process, policy, device, practice, or other actions which modify risk.
Note 2 to entry: Controls may not always exert the intended or assumed modifying effect.
© PECB official training – Reproduction prohibited without authorization
85
Section 4: Fundamental principles of information security
The ISO 27001 standard classifies security controls in three categories: preventive, detective and corrective.
Several information security reference frameworks define a classification with more categories.
Important note: Please note that these different types of controls are inter-linked. For example, the
establishment of an antivirus solution is a preventive control as to protect against malware. At the same time, the
virus is a detective measure when it detects a potential virus. Also, it provides a corrective measure when a
“suspicious” file is quarantined or deleted.
1. Preventive control
Goal: discourage or prevent the occurrence of problems
• Detect problems before they occur;
• Control operations;
• Prevent an error, an omission or malicious acts.
Examples
• Publication of the information security policy;
• Have partners and employees sign a confidentiality agreement;
• Establish and maintain appropriate contacts with groups of information security specialists;
• Hire only qualified personnel;
• Identification of risks from third parties;
• Segregation of duties;
• Separation of equipment development, testing and operating;
• Restrict access to systems during office hours;
• Securing offices, rooms and equipment;
• Use clearly defined procedures (to prevent errors);
• Use well clearly defined procedures (to avoid mistakes);
• Use of Cryptography;
• Use an access control software that only allows authorized personnel to access sensitive files.
© PECB official training – Reproduction prohibited without authorization
86
Section 4: Fundamental principles of information security
Detective control
Goal: Search for and identify anomalies
• Use controls that detect and report the occurrence of an error, omission or malicious act
Examples
• Check points in production jobs
• Echo control in telecommunications
• Accountability (capability to associate users and processes to their actions)
• Alarms to detect heat, smoke, fire or risks related to water
• Verification of calculation doublets
• Periodic status report with variances
• Internal audit functions
• Video cameras
• Intrusion detection system (IDS)
Corrective control
Goal: prevent the repetition of anomalies
• Minimize the impact of a threat
• Remedy problems discovered by detection controls
• Identify the problem causes
• Correct errors arising from a problem
• Modify the processing system to reduce the presence of future problems to a minimum
Examples
• Implementing emergency plans with the required training, awareness, testing procedures and
maintenance activities
• Emergency procedures, such as periodic backups, storage in a safe place and the recovery
of transactions
• Re-executed procedures
© PECB official training – Reproduction prohibited without authorization
87
Section 4: Fundamental principles of information security
2. Detective control
Goal: Search for and identify problems
• Use controls that detect and report the occurrence of an error, omission or malicious act.
Examples
•
•
•
•
•
•
•
•
•
•
•
•
Perform a periodic independent review of information security;
Monitor and review third-party services;
Monitor the resources used by systems;
Analysis of audit logs;
Integration of checkpoints in the applications in production;
Echo control in telecommunications;
Alarm triggering when sensing heat, smoke, fire or risk to water;
Verification of duplicate calculations in the data processing;
Detect break-ins with video cameras;
Detection of potential intrusions on networks with an intrusion detection system (IDS);
Review of user access rights;
Technical review of applications after a modification of the operating system.
© PECB official training – Reproduction prohibited without authorization
88
Section 4: Fundamental principles of information security
3. Corrective control
Goal: Overcome the problems discovered and prevent the recurrence of problems
• Minimize the impact of a threat;
• Overcome problems discovered by detection controls;
• Identify the causes of the problem;
• Correct errors arising from a problem;
• Modify the processing system to reduce the presence of future problems to a minimum.
Examples
• Technical and legal investigation (forensics) following a security incident;
• Enabling the business continuity plan after the occurrence of a disaster;
• Review of the security policy after the integration of a new division to the organization;
• Appeal to authorities to report a computer crime;
• Change all passwords of all systems when a successful computer network intrusion has been
detected;
• Recover the transactions with the backup procedure after the discovery that some data has
been corrupted;
• Automatic disconnection of idle sessions;
• Implementation of patches following the identification of technical vulnerabilities.
© PECB official training – Reproduction prohibited without authorization
89
Section 4: Fundamental principles of information security
1. Assets and controls can present vulnerabilities that can be exploited by threats.
2. It is the combination of threats and vulnerabilities that can increase the potential effect of the risk.
3. Controls enable vulnerabilities to be reduced. An organization has few alternatives to act against
threats. For example, controls can be implemented to protect against system intrusions, but it is
difficult for an organization to take action to reduce the number of hackers on the Internet.
© PECB official training – Reproduction prohibited without authorization
90
Section 4: Fundamental principles of information security
For each of the following 5 controls, indicate if it used as a preventive, corrective, and/or detective control;
and indicate, if the control is an administrative, technical, managerial or legal measure. Explain your
answer.
Example: The installation of a fence around the site of the organization.
It is a preventive control that will help to secure the organization site against unauthorized physical access.
The installation of a wire fence is a technical measure that involves material installation.
1.
2.
3.
4.
5.
Attribution of information security responsibilities to each member of the organization
Implementation of a fire alarm system
Encryption of electronic communications
Investigate security incident
Identification of applicable legislation
Duration of the exercise: 20 minutes
Comments: 15 minutes
© PECB official training – Reproduction prohibited without authorization
91
Section 4: Fundamental principles of information security
© PECB official training – Reproduction prohibited without authorization
92
Section 5: Initiating the ISMS implementation
Main objectives of initiating the ISMS implementation
1. To determine the methodological approach for the project management of the ISMS implementation
2. Select a project methodology for the ISMS implementation
© PECB official training – Reproduction prohibited without authorization
93
Section 5: Initiating the ISMS implementation
Definitions related to project management
ISO 27003 and ISO 10006
• Project: Unique process, consisting of a set of coordinated and controlled activities
with start and finish dates, undertaken to achieve an objective conforming to specific
requirements, including the constraints of time, cost and resources (ISO 10006, 3.5)
• Activity: Smallest identified item of work in a project process (ISO 10006, 3.1)
• Project management: Planning, organizing, monitoring, controlling and reporting of
all aspects of a project and the motivation of all those involved in it to achieve the
project objectives (ISO 10006, 3.6).
• ISMS project: Structured activities undertaken by an organization to implement an
ISMS (ISO 27003, 3.1).
Notes on terminology
1. The project’s organization is normally temporary and established for the lifetime of
the project.
2. An individual project may form part of a larger project structure.
3. The complexity of the interactions among project activities is not necessarily related
to the project size.
4. We must distinguish between the ISMS project and the management of operations of
an ISMS. Conducting an ISMS project aims to implement a system of information
security management. Management of ISMS operations is the daily management
and maintenance of the ISMS.
Important note: This course main purpose is to explain the methodology for the ISMS
management project and not the management control of daily operations. However, a
section is devoted to the management of ISMS operations at the end of day 3.
© PECB official training – Reproduction prohibited without authorization
94
Section 5: Initiating the ISMS implementation
List of activities included in PECB IMS2 methodology with the corresponding input and output
Input
• Intention of the organization to implement an ISMS
Activities
1. Definition of the approach to the ISMS implementation
2. Selection of a methodological framework to manage the ISMS implementation project
3. Alignment with the best practices (read documentation on the best practices used on the market and
buy copies of the needed standards)
Output
• Selection of a project management methodology
© PECB official training – Reproduction prohibited without authorization
95
Section 5: Initiating the ISMS implementation
An organization wishing to comply with ISO 27001 may consider several approaches based on:
• The speed of implementation
• The scope
• The maturity level targeted of the process and the security controls
(compared to the initial ISMS - different approaches)
Using a rational approach, it is not unreasonable to consider a period of 6 to 12 months for the project from
conception to completion of the first cycle of audits and the monitoring of the system.
According to a survey ("ISO 27001 Global Survey 2008, Certification Europe”) of 312 firms certified to ISO
27001, 60% of them, the proposed implementation of the ISMS took less than 12 months and 20%, less
than 6 months. It is noteworthy that all firms that have taken less than six months to implement an ISMS
had another management system already in place in the organization.
© PECB official training – Reproduction prohibited without authorization
96
Section 5: Initiating the ISMS implementation
In the case of SMEs, the survey reveals that the average duration of an ISMS project is 6 to 12 months
and that 3-4 people part time (effort of 35 to 60 days per person) were involved. For large companies,
the average completion time is 12 to 18 months with an average of two people dedicated full time to the
project (in addition to many collaborators from time to time). This average shall apply to any type of
organization already reasonably secure. That is to say, organizations which have previously
implemented security measures commonly used in industry, particularly on the technical level: firewalls,
antivirus, etc..
When a limited scope for the ISMS is considered at the start of the project like the approach "IT
Governance fast track" (approach to achieve the goal very quickly in a given business context), a
medium-sized organization could complete such projects in 4 to 7 months.
© PECB official training – Reproduction prohibited without authorization
97
Section 5: Initiating the ISMS implementation
Traditionally, the implementation approaches proposed for an ISMS are sequential. The Project
plan of the organization is completed prior to the establishment of a project dedicated to the ISMS,
as well as phases of monitoring and improvement are activated only when the location of system
components has been finalized. In each phase, it is not unusual that security controls are also
implemented sequentially (e.g., antivirus policy is developed and approved before the procedures
and work instructions concerning the management of this control are actually written and
implemented).
The major drawback of this approach is that it is a major consumer of time and resources, whether
for planning, approval or implementation of the system "piece by piece.“ This approach also
removes the management system immediate interest to control since it will have to wait until all
pieces of the puzzle are assembled before any direct beneficial effects can be felt within the
organization. This approach has the disadvantage of "exhausting" the participants during the
implementation process, with thus a major risk of abandonment during the project.
© PECB official training – Reproduction prohibited without authorization
98
Section 5: Initiating the ISMS implementation
The approach proposed in this course tries to circumvent this difficulty by proposing a philosophy based
on 5 Principles to initialize such a system within a reasonable time for the organization:
1. Business Approach - integrated into the business environment of the organization, choose an
application domain related to the heart of business.
2. Systems Approach - Overall, no implementation of isolated processes.
3. Systematic Approach - applying the best practices of project management (as, for example, ISO
10006).
4. Integrated Approach - a management system for the overall management of security and not one for
SOX, one for Basel 2, one for 27001, etc.. Also, align or integrate the ISMS with other management
systems already in place in the organization (Example: ISO 9001)
5. Iterative Approach - rapid establishment of a minimal process and its improvement thereafter in an
initial application domain where the actors are identified and involved and the processes defined.
© PECB official training – Reproduction prohibited without authorization
99
Section 5: Initiating the ISMS implementation
Some recommendations to address properly these principles in the field:
1. Avoid the integration of new technologies - design the initial system with technology already in place in
the organization. Most organizations have already established the minimum technology needed to
implement an ISMS. Optimization of the ISMS with more efficient technologies can be done at the
continuous improvement phase thereafter.
2. Integrate the ISMS in existing processes - reuse everything that can be and is already formalized and
put in relation to the requirements of the ISMS framework. Avoid creating any number of processes that
do not fit the reality of the organization.
3. Apply the principles of continuous improvement - applying the principles of continuous improvement
taking into account the suggestions and improvements suggested by the interested parties in the
project. Also, modest goals should be envisaged at the start and a progressive improvement must be
set in the long term.
4. Involve stakeholders in the organization - defining the roles and responsibilities of all project
stakeholders early in the implementation process, ensuring their involvement and motivation; study
their relations and maintain them in the system once initialized.
5. Get support from the management - ensuring that the management understands and supports the
project; it will grant the importance and means required in a timely manner, ensuring that the
management fulfills its responsibilities for information security Policy, risk management and the regular
review of the management system over time.
6. Appoint an ISMS project manager - identify and appoint a responsible and accountable person for
project implementation. This is not necessarily the ISMS manager, but this appointment will guarantee
the smooth running of operations of establishment, the timing and the support (budget, approvals, etc..)
Important Note: It is not mandatory or necessary to implement systems to address complex issues. In
most cases, common sense and project management will indicate the course of action to be effective and
to remain so.
© PECB official training – Reproduction prohibited without authorization
100
Section 5: Initiating the ISMS implementation
By following a structured and effective methodology, an organization can be sure to cover all the minimum
requirements for the implementation of an management system.
Important notes:
1. Whatever methodology used, the organization must adapt it to its particular context (requirements, size
of the organization, scope, objectives, etc...) and not apply it like a cookbook.
2. The sequence of steps can be changed (inversion, merge ...). For example, the implementation of the
documentation management procedure can be done before the understanding of the organization.
3. Many processes are iterative because of the need for progressive development throughout the
implementation project; for example, communication and training.
© PECB official training – Reproduction prohibited without authorization
101
Section 5: Initiating the ISMS implementation
PECB has developed an approach and methodology for implementing a management system. It is called
"Integrated Implementation Methodology for Management Systems and Standards (IMS2)” and is based on
best practices. This methodology is based on the guidelines of ISO standards and meets the requirements
of ISO 27001.
IMS2 is based on the PDCA cycle divided into four phases: Plan, Do, Check and Act. Each phase has
between 2 and 8 steps. In turn, these steps are divided into activities, activities in tasks. During the training
the steps and activities will be presented and illustrated in the chronological order of the course of an
implementation project.
Tasks will not be detailed because there are specific for each project and depend on the organization
context. For example, the activities 1.4.2 (Establish the ISMS Project Team) will involve a series of tasks
such as the description of the job, interview candidates, signing a contract, etc.
© PECB official training – Reproduction prohibited without authorization
102
Section 5: Initiating the ISMS implementation
ISO 10006: Quality management systems - Guidelines for quality management in projects . ISO
10006 gives guidance on the application of quality management in projects. It is applicable to
projects of varying complexity, small or large, of short or long duration, in different environments,
and irrespective of the kind of product or process involved. This can necessitate some tailoring of
the guidance to suit a particular project.
Reference: www.iso.org
Project Management Institute (PMI): With more than 240 000 members in over 160 countries,
PMI is the largest member association for professionals in project management. PMI is actively
committed to the profession, by setting professional standards, conducting research and
providing access to a wide range of information and resources. PMI also promotes career and
professional development and offers certification, networking and opportunities for improvement
to the community. The best-known certification offered by PMI is the Project Management
Professional (PMP).
The PMI also publishes the PMBOK (Project Management Body of Knowledge) Guide. This
reference identifies and describes the knowledge and practices applicable to most projects, and
gathering a broad consensus on their values and utilities. The guide recognizes 5 groups of basic
processes: initiation, planning, implementation, monitoring and verification, and the closing of a
project. The processes are described in terms of: inputs (documents, plans, designs, etc..); tools
and techniques (mechanisms applied to inputs) and outputs (documents, products, etc..) Also 9
knowledge areas are defined: Project Integration Management, Project Scope Management,
Project Time Management, Project Cost Management, Project Quality Management, Project
Human Resource Management, Project Communications Management, Project Risk
Management and
Project Procurement Management
Reference: www.pmi.org
© PECB official training – Reproduction prohibited without authorization
103
Section 5: Initiating the ISMS implementation
ISO 27003 outlines the major steps in implementing an ISMS. It guides the user and provides assistance to
implement the system effectively. The standard contains the following sections:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Introduction
Scope
Terms and definitions
Structure of this International Standard
Obtaining management approval for initiating an ISMS project
Defining ISMS scope, boundaries and information security policy
Conducting information security requirements analysis
Conducting risk assessment and planning risk treatment
Designing the ISMS
The methodological framework proposed by ISO 27003 is generic and applicable to all types of
organizations. However, it is not an exhaustive reference and does not claim to be universal. Also, this
framework is not a formal methodology because it does not contain an equipped operational approach. It
should be noted that its use is not a requirement in itself that can lead to the certification to ISO 27001.
The methodology proposed by PECB is based upon part of the approach described in ISO 27003 but does
not claim it substitutes it. The objective of this methodology is to make an operational step by step
implementation of an ISMS. That is to say, explain with examples and tools, the "how" starting from "what"
as described in ISO 27003.
Important Note: Please note that during this training, all subjects are not discussed in detail. So, subjects
briefly mentioned here, such as the presentation of the 114 security controls in Annex A, should not be
regarded as unimportant.
© PECB official training – Reproduction prohibited without authorization
104
Section 5: Initiating the ISMS implementation
The core of best practices included in the various ISO standards provides access to knowledge which has a
large consensus among experts in the information security field. These notions of best practices should not
be confused with the requirements of the standards. A good practice is a recommendation not a
requirement. This means that each organization is free to use it as a reference or not, or even, to apply it or
not.
In this training, it was a conscious choice, to present the good practices published in various ISO standards.
However, there are several other sources of good practices such as ANSI or the ITIL library. An
organization may also refer to ISO 27035 to develop its incident management process. It could equally well
be based on ITIL or on CERT guides in that domain.
Note on terminology
1. "Good practice" means it is generally recognized that the implementation of recommendations related
to the practices described corresponds to activities, tools and techniques widely used by specialists.
2. "Generally recognized" means that the knowledge and/or the practices presented are usually applicable
to most organizations as well as their value and utility are subject to a fairly broad consensus
© PECB official training – Reproduction prohibited without authorization
105
Section 5: Initiating the ISMS implementation
© PECB official training – Reproduction prohibited without authorization
106
Section 6: Understanding the organization and clarifying the information security objectives
© PECB official training – Reproduction prohibited without authorization
107
Section 6: Understanding the organization and clarifying the information security objectives
Main objectives of this step
1. Understand the organization and its context.
2. Gather the necessary information to plan the ISMS implementation.
3. Ensure that the ISMS objectives are aligned with the business objectives of the organization.
Understanding the organization is essential before starting a project to implement an ISMS. The difficulty of
this step is to accurately understand how the organization is structured internally and how it is situated in its
external environment. It brings together all the necessary information, which is a prerequisite for the
realization of a gap analysis between the existing system and the desired one.
© PECB official training – Reproduction prohibited without authorization
108
Section 6: Understanding the organization and clarifying the information security objectives
An organization wishing to comply with ISO 27001 shall at least:
1. Be able to demonstrate that its ISMS is aligned with its mission and its objectives and business
strategies;
2. Identify and document the organization’s activities, functions, services, products, partnerships, supply
chains and relationships with interested parties;
3. Define the external and internal factors that can influence the ISMS;
4. Know and take into account issues related to information security within their industrial sector such as
risk, legal and regulatory obligations and customer requirements.
5. Establish and document objectives for the ISMS.
© PECB official training – Reproduction prohibited without authorization
109
Section 6: Understanding the organization and clarifying the information security objectives
© PECB official training – Reproduction prohibited without authorization
110
Section 6: Understanding the organization and clarifying the information security objectives
Definitions related to the concept of “organization”
ISO 9000
•
Organization: person or group of people that has its own functions with responsibilities,
authorities and relationships to achieve its objectives (ISO 9000, 3.2.1).
•
Infrastructure: System of facilities, equipment and services needed for the operation of an
organization (ISO 9000, 3.5.2).
•
Requirement: Need or expectation that is stated, generally implied or obligatory (ISO
9000, 3.6.4).
Notes on terminology
1. An organization is a structured and usually registered with a government body. This may be,
for example: a company, institution, charity, self-employed, an association or a combination
thereof. An organization can be public or private.
2. “Infrastructure” can be used as a synonym of “supporting asset” as defined by ISO 27005
(see section 11, day 2).
3. Do not confuse the use of the term "requirement" in the context of the specifications laid down
in a standard and "requirements of the organization." The organization's requirements may
come from different stakeholders. They can be explicit (defined by contract, agreement,
regulation) or implicit (not documented).
© PECB official training – Reproduction prohibited without authorization
111
Section 6: Understanding the organization and clarifying the information security objectives
List of activities included in PECB IMS2 methodology with the corresponding input and output
Input
• General information about the organization (Website, annual report, catalogue of products and
services, etc.)
• Strategic objectives of the organization
• List of applicable laws, contracts and signed agreements
Activities
1. Understanding of the mission, objectives, values, strategies of the organization
2. Analyzing the external environment
3. Analyzing the internal environment
4. Identification of the key processes and activities
5. Identification of infrastructure
6. Identification and analysis of interested Parties
7. Identification and analysis of business requirements
8. Determination of the ISMS objectives
9. Preliminary definition of the scope
Output
• Brief description of the organization and its environment
• List of stakeholders and their requirements
• List of applicable legal, regulatory and contractual obligations
• Objectives and priorities related to ISMS
• Preliminary Scope
© PECB official training – Reproduction prohibited without authorization
112
Section 6: Understanding the organization and clarifying the information security objectives
It is necessary to obtain an overview of the organization to understand the security challenges of the
organization and the risk inherent in that market segment. General information about the organization
concerned should be collected in order to better appreciate its mission, strategies, main purpose, values,
etc. This helps ensure consistency and alignment between the strategic objectives for risk management
and the organization's mission.
Mission: The mission is the reason for the company to exist. This is what justifies what brings the
organization to do what she does. For example, the mission of an organization may be to offer customers
the best value in terms of furniture, overcome cancer or make affordable motor vehicles.
Implications for risk management: The Information Security aims to support the organization in fulfilling its
mission to protect its information assets. The information security must therefore be aligned with the
corporate mission.
Values: Values are the fundamental and enduring beliefs that are shared by members of an organization
and influence the behavior of individuals.
Implications for risk management: The values of the organization influence the choices made by
professionals in IT risk management. For example, values can influence the priorities and policies in terms
of evaluating risks.
© PECB official training – Reproduction prohibited without authorization
113
Section 6: Understanding the organization and clarifying the information security objectives
Objectives: An objective is the result that the organization wants to achieve. These objectives
are generally clear, quantified and time bound (5% gain in market share in 24 months, increased
from $ 20,000,000 in sales in France 12 months ...).
Implications for risk management: As for strategy, risk management must know and be aligned
with business objectives to achieve its objectives by identifying information risk that the
organization must manage.
Strategies: The strategy consists in the definition of actions occurring in a logical sequence to
achieve one or more goals.
Implications for risk management: The choice of treatment and the resulting actions will also
depend on the strategy defined by the organization.
© PECB official training – Reproduction prohibited without authorization
114
Section 6: Understanding the organization and clarifying the information security objectives
There are several models that have been developed to analyze and understand the strategic context of an
organization. Note that this step does not become a project in itself. In most organizations, studies have
been conducted internally or by consulting firms on their strategic positioning. It should be enough to just
collect these studies, analyze them and interview some key persons to ensure an adequate understanding
of the organization.
Particular attention should be paid to the identification and analysis of known threats and external
security requirements related to the industrial sector of the organization. Also, a marketing analysis
could be undertaken to verify if the implementation of an ISMS will generate a competitive advantage for
the organization or whether it can become a condition of the market to remain in business. For example,
several organizations are considering requesting an ISO 27001 certification from their IT service providers.
© PECB official training – Reproduction prohibited without authorization
115
Section 6: Understanding the organization and clarifying the information security objectives
Here are some frequently used models:
1. SWOT analysis (Strengths, Weaknesses, Opportunities, Threats): This model is to make a
diagnosis of the organization by analyzing its strengths, weaknesses, opportunities and threats in
order to formulate policy options and determine where the organization should invest its
resources. The main questions to ask in a SWOT analysis are:
A. Strengths:
What advantages does your organization have?
What do you do better than anyone else?
What unique or lowest-cost resources can you draw upon that others can't?
What do people in your market see as your strengths?
What factors mean that you "get the sale"?
What is your organization's Unique Selling Proposition (USP)?
B. Weaknesses:
What could you improve?
What should you avoid?
What are people in your market likely to see as weaknesses?
What factors lose you sales?
C. Opportunities:
What good opportunities can you spot?
What interesting trends are you aware of?
D. Threats:
What obstacles do you face?
What are your competitors doing?
Are quality standards or specifications for your job, products or services changing?
Is changing technology threatening your position?
Do you have bad debt or cash-flow problems?
Could any of your weaknesses seriously threaten your business?
2. PEST Analysis (Political, Economic, Social, Technological): The PEST analysis allows the
organization to analyze the market forces and opportunities categorized into four areas: social,
technological, economic and political. Some authors have added two other categories: legal and
environmental.
• Strengths: characteristics of the business, or project team that give it an advantage over
others.
• Weaknesses (or Limitations): are characteristics that place the team at a disadvantage
relative to others.
• Opportunities: external chances to improve performance (e.g. make greater profits) in the
environment.
• Threats: external elements in the environment that could cause trouble for the business or
project.
3. Five Forces Analysis: This approach consists in modeling the competitive environment of
business in the form of five factors that influence the actions within an industry. These five forces
consist of the intensity of rivalry among competitors, the bargaining power of customers, the
threat of potential entrants in the market, the bargaining power of suppliers, threats of alternative
products.
© PECB official training – Reproduction prohibited without authorization
116
Section 6: Understanding the organization and clarifying the information security objectives
In analyzing the internal environment, it is necessary to identify the structures comprising the various
bodies and relations between them (hierarchical and functional). These include segregation of duties,
responsibilities, authority and communication within the organization that should be studied. The functions
outsourced to the subcontractors should also be identified.
The structure of the organization may be of different types:
1. The divisional structure: each division is under the authority of a division director responsible for
strategic, administrative and operational decisions within this unit.
2. The functional structure: functional authority exercised over proceedings, the nature of work and
sometimes the decisions or planning (e.g. production, information technology, human resources,
marketing ...).
Notes:
• A division within the organization divisional structure can be organized into functions and vice versa.
• We say that an organization has a matrix structure where the entire organization is based on the two
structure types.
• Whatever the structure, the following levels are distinguished:
1. The decision level (responsible for the policy and the strategies)
2. The steering level (responsible for the coordination and management activities)
3. The operational level (responsible for production and support activities)
The organizational chart is an excellent tool to get to understand the internal environment. It shows, using a
scheme, the structure of the organization. This representation shows the links of subordination and
delegation of authority, but also dependencies. Even if the chart illustrates that no formal authority exists,
based upon the links, the information flows can be deduced.
© PECB official training – Reproduction prohibited without authorization
117
Section 6: Understanding the organization and clarifying the information security objectives
It is essential for the ISMS project manager to know the range of products and services of the
organization. Indeed, the type of goods and services produced by the organization will have a major impact
on its business model and how the organization conducts its business. In addition, products and services
may let the organization be exposed to special risks, such as environmental hazards or prosecution.
It is also essential for the ISMS project manager to understand the business processes of the
organization because it is the conduct of the process that exposes the organization to numerous
information security risks. The risk manager should analyze and understand the nature of these processes
and determine the direct and indirect risks to which the organization is exposed during operations as was
done during the risk analysis.
The identification of information assets of the organization is crucial when developing an ISMS. Indeed,
the increasingly complex technical management environments tend to make it more and more difficult to
protect assets that are constantly evolving, are combined with other assets to form new assets. Thus, the
ISMS project manager has to pay particular attention to:
• Identify unambiguously which are the owners of assets;
• Have the owners to understand, consistently and unambiguously the contours of the assets they are
responsible for;
• Define for each asset a complete set of related security requirements;
• Describe unequivocally where assets are stored, moved and used (whether in a physical or logical way);
• Determine the value that the organization attaches to the evaluated assets. That value can be absolute
(e.g., a purchase price or replacement) or relative (direct cost or indirect loss caused by this asset).
© PECB official training – Reproduction prohibited without authorization
118
Section 6: Understanding the organization and clarifying the information security objectives
Despite the fact that the family of ISO 27000 standards is concerned with protecting all information assets,
and not only those related to information technologies, the ISMS project manager must understand the
process and IT infrastructure of the organization because these processes play a vital part in the
processing, transfer and maintenance of organizational information.
In ISO 27005, the IT infrastructures belong to the category of the supporting assets In Annex B.1.2., the
sub-categories are defined for each asset category with examples. During the second day of the training,
we shall see in more detail what is the identification and analysis of risks related to the assets.
© PECB official training – Reproduction prohibited without authorization
119
Section 6: Understanding the organization and clarifying the information security objectives
ISO 27001 often raises the topic of the interested parties, which in this context denotes the both
internal and external interested parties of the organization with interests in the process of information
security management.
ISO 27001 also stipulates that the ISMS is intended to ensure the selection of appropriate and
proportional security controls to protect the assets and give confidence to interested parties.
Note on terminology: ISO 27005 also uses the term "stakeholders“ without nuance. Some experts
define stakeholders as a sub-category of the interested parties. Stakeholders are those who take
direct action in connection with the ISMS (such as employees, customers or suppliers). The media or
legislators would only be interested parties because they do not generally work directly related to the
ISMS.
Definitions
Interested party: person or organization that can affect, be affected by, or perceive itself to be
affected by a decision or activity
EXAMPLE Customers , owners, people in an organization, providers , bankers, regulators, unions,
partners or society that can include competitors or opposing pressure groups.
Note 1 to entry: This constitutes one of the common terms and core definitions for ISO management
system standards given in Annex SL of the Consolidated ISO Supplement to the ISO/IEC Directives,
Part 1. The original
definition has been modified by adding the Example.
Reference : ISO 9000, clause 3.2.3
Customer : person or organization that could or does receive a product or a service that is intended
for or required by this person or organization
EXAMPLE Consumer, client, end-user, retailer, receiver of product or service from an internal
process , beneficiary and purchaser.
Note 1 to entry: A customer can be internal or external to the organization.
Reference: ISO 9000, clause 3.2.4
© PECB official training – Reproduction prohibited without authorization
120
Section 6: Understanding the organization and clarifying the information security objectives
In a first step, the ISMS project team should identify all interested parties and their requirements and
expectations on information security. It is imperative to identify the interested parties so that they can get
involved in the process of risk assessment and implementation of the ISMS. A requirement could be that
any violation of information security will not lead to financial hardship and/or will not affect the organization.
An expectation might be that if a serious incident occurs, for example, a computer system failure, enough
people are trained in adequate procedures to reduce the impact of this incident and restore services
quickly.
In a second step, the ISMS project team should analyze the security needs of interested parties and
confirm that the organization responds to their concerns. This activity can be done by sending a
questionnaire, conducting interviews, or by facilitating focus groups. One should also be aware of the
service agreements concluded and analyze the security requirements, explicit or implicit, that they contain.
In a third step, the ISMS project team should define what is expected of different stakeholders within the
project roles, responsibilities and levels of participation required. It should thereby come to a consensus on
their involvement with the stakeholders during the planning stage.
We must foresee time in the project to support the stakeholders in their assigned tasks (answering
questions, consolidating reports, presenting project progress, etc..).
Important note: The organization has an obligation to inform all stakeholders of actions and improvements
related to information security that could have an impact on them with such a level of detail that is
appropriate to the circumstances. The topic will be addressed in the section on training, awareness and
communication (Day 3 of the training). (see ISO 27001, Clause 7.2-7.4)
© PECB official training – Reproduction prohibited without authorization
121
Section 6: Understanding the organization and clarifying the information security objectives
Taking into account the requirements and expectations of interested parties is needed for a successful
implementation of the ISMS project. Their requirements and expectations should be fully understood to
ensure that processes and security controls are geared to these requirements. We can classify the
interested parties into two categories: those who support the project and those who oppose it.
Positive interested parties help the ISMS to lead to succeed because it serves their interest.
For example, the CIO of an organization might consider it as a positive fact that the ISMS will bring new
dimensions of action to the management team to assess security incidents in a more fine way than before,
within a standardized governance framework, in order to improve the reporting to the management.
Strategy ļƒœ active involvement as a stakeholder.
For negative interested parties, the negative logic will impede the smooth running of the project and try to
derail it.
For example, the head of a department in charge of managing users’ access rights would not be pleased to
see that additional security controls are being set up because they could undermine the effectiveness of his
team to grant access rights in time or because it might cause his team to increase doing overtime which is
difficult to incorporate into the daily work.
Strategy ļƒœ contact him on the objectives, highlighting the best interests of the organization, negotiating
compromises or neutralize his influence as a last resort.
© PECB official training – Reproduction prohibited without authorization
122
Section 6: Understanding the organization and clarifying the information security objectives
Other positive examples:
• The CFO thinks that the ISMS is a good tool for assessing the value (even relative) of
intangible assets of the organization;
• The quality manager is motivated by the fact that compliance with the standard ISO 27001 will
help to reactivate the quality management process that had been somewhat neglected since
the last ISO 9001 certification. Combining both standards also seemed to be a good way to
develop economical good practices internally;
• The firm's customers perceive compliance to ISO 27001 as a better guarantee that their
personal data will be more effectively protected by the supplier;
• Etc..
Other negative examples:
• The HR manager feels the ISMS as a vector with a certain heaviness, a certain impact on the
effective functioning of his department;
• The head of physical security (managed by an external company) receives the ISMS as a
disruptive element in his role as the ISMS system distributes the roles and responsibilities
more granular than before and that it seems that it will reduce the workload ;
• The maintenance technicians are reluctant to implement security controls for automated
monitoring of servers because they fear that this engenders monitoring of performance losses
on production machines
• Etc..
One possible way to deal with negative attitudes in relation to the establishment of the ISMS may
be to nominate a "ISMS champion". This person, usually a member of the leading team or a
person with responsibilities high enough in the organization, could play the role of the "white
knight", protector of the ISMS project and guarantees its success.
This person is then supposed to embody the will of the management to lead the implementation
of the system. As such, he has full power and authority delegated to him to support and to help
finalize the project. In contrast to the role of protector, we sometimes develop a kind of "antichampion" or "negative leader" who symbolizes the conflicting interests to realize the project, for
whatever reasons. The role of champion is therefore quite useful to counter hostile actions
against the project that could come from negative interested parties represented by one or more
leaders.
© PECB official training – Reproduction prohibited without authorization
123
Section 6: Understanding the organization and clarifying the information security objectives
The organization must take into account the requirements of the business and legal or regulatory
requirements, and contractual security obligations that were agreed with various interested parties. To
do so, we must identify and take into account all the requirements on the organization that could
influence the direction for the handling of information security. Finally, they must be included in the
risk assessment process by analyzing the risks of non-compliance.
It should be noted that for the identification and analysis of legal and contractual requirements, it is
necessary to involve legal advisers or lawyers qualified in the field. An expert in information security is
usually not suited, for example, to analyze the implications of security laws.
© PECB official training – Reproduction prohibited without authorization
124
Section 6: Understanding the organization and clarifying the information security objectives
The security requirements for all organizations, small or large, are derived mainly from four
sources:
1. Laws and Regulations: see following slides
2. Standards: Organizations must comply with a set of international standards and codes of
practice related to their industry sector they have implemented voluntarily. Although
adherence to implement regulatory frameworks is a voluntary choice, from the point of view
of information security, they become obligations to comply with (with the risk to lose its
certification in case of serious failure).
3. Market: The market requirements include all contractual obligations that the organization has
signed with its stakeholders. A breach of contractual obligations may result in penalties (when
stated in the contracts) or civil suits for damages. Also, the market requirements are all
implicit rules that an organization should meet to do business. For example, although the
organization has no contractual obligation to deliver its products according to planning, it
goes without saying that this is a commercial policy basis to meet the scheduled delivery
times.
4. Internal policies: Internal policies include all requirements defined inside the organization:
internal policies (human resources, information security, supply chain, etc..) ethical codes,
work rules, etc.. In case of failure, we can consider that these are violations of internal
policies without necessarily an involvement of any legal considerations.
© PECB official training – Reproduction prohibited without authorization
125
Section 6: Understanding the organization and clarifying the information security objectives
ISO 27002
IMPORTANT - This publication is not intended to include all provisions necessary for a contract. Users are
responsible for its application in the appropriate conditions. Compliance with an ISO/IEC standard confers
no exemption to the satisfaction of legal obligations.
ISO 27002, domain 18 - Compliance
18.1: Compliance with legal and contractual requirements
Objective: To avoid breaches of legal, statutory, regulatory or contractual obligations related to information
security and of any security requirements.
18.1.1: Identification of applicable legislation and contractual requirements
Control: All relevant legislative statutory, regulatory, contractual requirements and the organization’s
approach to meet these requirements should be explicitly identified, documented and kept up to date for
each information system and the organization.
Implementation guidance: The specific controls and individual responsibilities to meet these requirements
should also be defined and documented.
Managers should identify all legislation applicable to their organization in order to meet the requirements for
their type of business. If the organization conducts business in other countries, managers should consider
compliance in all relevant countries.
© PECB official training – Reproduction prohibited without authorization
126
Section 6: Understanding the organization and clarifying the information security objectives
It is generally desirable that the expert in information security is working with legal advisers to identify the
subjects to analyze and explain the security issues involved. For example, he should explain the lawyer
involved in this analysis the mode of operation of the monitoring network, so he can better assess whether
it violates a privacy law or any internal regulation of the organization.
Moreover, new laws related to privacy issues, financial obligations and corporate governance requires them
to monitor their IT infrastructure more responsive and effective than before. Several public and private
organizations that deal with these companies are mandated to ensure a minimum level of safety. In the
absence of a proactive security, business executives may be exposed to lawsuits (in civil or even
sometimes criminal) for breach of their fiduciary and legal responsibilities. In larger companies, demand for
legal advice may focus on:
1. Data protection
In countries where specific laws exist that cover the safeguarding of confidentiality and data integrity, it is
often limited to control of personal data. In the same way that security incidents must be related to the
individuals who caused it, personal information should also be subject to management and adequate
recording. A structured approach for incident management related to information security should therefore
manage the most appropriate measures to protect the privacy.
2. Respect for privacy
In compliance with applicable laws, many organizations choose to establish a policy for the protection of
privacy, often designed to achieve the following objectives:
- Increase awareness of regulatory, legal and business requirements regarding the treatment and
protection of personal information;
- Establish a clear and complete company policy for the treatment of personal information;
- Establish the responsibility of all persons dealing with personal information, and;
- Enable the organization to meet its commercial liability, legal and regulatory obligations in respect of
personal information.
© PECB official training – Reproduction prohibited without authorization
127
Section 6: Understanding the organization and clarifying the information security objectives
3. The identification and prosecution of computer crimes
Cyber crime represents a significant threat via the Internet for information systems of an
organization. The damage can be really big, and can result in direct financial losses, lost
reputation or lost time for the organization. It has many faces and knows no borders. The generic
and unstable nature requires the head of the organization (with virtually any structure being
connected to an external network) to have the necessary awareness and to have implemented
the adequate countermeasures in compliance with applicable laws. Ensure that the collection of
evidence respects legislation. Protective measures cannot themselves be crimes (e.g.,
responding to spam by countermeasures such as buffer overflow attack, ...)
4. The use of digital signature
Today, the law recognizes the validity of agreements on the evidence as was already the case
based on the non-mandatory rules on evidence. The drafting of these agreements cannot be
done no matter how; drafting should proceed in respect to the context in which they fall to be
considered valid in case of litigation. In some countries, electronic records must ensure the
preservation of "traces" as evidence of integrity and safety procedures developed on the basis of
recognized standards for electronic records (e.g., in France, the AFNOR NF Z 42 -013 or more
internationally, the standard ISO 14721 for the "transfer systems and spatial information - System
Open Archival Information - Reference Model").
5. Intellectual property
The results of intellectual effort is often recognized by national and international conventions as
an intellectual property right to protect certain intangible assets. For small and medium
enterprises, efficient use of human intellectual property can help compete with bigger companies.
Intellectual property has great potential for SMEs in terms of legal protection, information
technology and competitive advantage. The goal here is to strengthen the competitive position of
the company.
6. Commerce and electronic payments
From a legal standpoint, in most countries it is quite essential to prove in court that a customer
bought the product or service sold by the company. It should also be possible to satisfy the tax
authority to show in which period the individual transactions took place. The big difference
between electronic commerce and trade by paper is the medium in which transactions are stored.
With proof on paper, a physical change is difficult while a change to an electronic file is easier.
Another aspect is the possibility that a competitor may offer the same products from a server
located in a tax haven. Finally, when a consumer buys a product on a website, it is not always
easy to determine which national law applies.
7. The records management is ensured
Some national laws require that companies maintain updated records regarding their activities to
the review through a process of annual audit. Similar requirements exist at the governmental
level. In some countries, organizations are obliged by law to issue such reports or to provide
records for legal purposes (for example, in each case which could be the result of an offense
involving penetration of a sensitive Government system).
© PECB official training – Reproduction prohibited without authorization
128
Section 6: Understanding the organization and clarifying the information security objectives
ISO 27001 and Regulatory Frameworks
Example – United States
Sarbanes-Oxley Act (2002)
The Sarbanes-Oxley Act or SOX was introduced following different financial scandals revealed in
the United-States at the beginning of the years 2000, such as the Enron or the WorldCom affaire.
It brings crucial legislative changes concerning the financial governance and administration of
companies to protect stockholders. SOX is based on the establishment of controls based on the
conceptual framework such as COSO (Committee of Sponsoring Organizations of the Treadway
Commission) for example.
HIPAA (1996)
HIPAA (Health Insurance Portability and Accountability Act) is an act that aims to protect the
personal information related to the activities of the healthcare industry. Standards established
concerning the administrative and financial transactions, security of personal information and
unique health identifiers (e.g. insurance number, disease identifier).
GLBA (1999)
The function of the Gramm-Leach-Bliley Act is to make American financial institutions more
competitive. Some clauses of this act force financial institutions to ensure a minimum level of
protection of information touching its customers and to implement controls to protect the security
of information.
Federal Information Security Management Act (2002)
FISMA (legislation on information security management) imposes a series of processes that must
be followed for any information system used by the American Federal Government, its
contractors or suppliers.
SB 1386 (2002)
California Senate Bill 1386 forces organizations doing business in California and who hold
personal information to inform any California resident of any security breach that can affect their
personal information.
NIST 800-53 (2006)
NIST 800-53 (National Institute for Standards and Technology) provides guidelines to secure
information systems within the federal government by choosing and specifying security controls.
These guidelines apply to every part of an information system that processes, stores, or transmits
federal information. It is issued by the U.S. Department of Commerce.
© PECB official training – Reproduction prohibited without authorization
129
Section 6: Understanding the organization and clarifying the information security objectives
ISO 27001 and Regulatory Frameworks
Example – Europe
The European Parliament and the European Council have issued several guidelines, regulations and
decisions related to information security. These guidelines are strongly based on the protection of
European consumer-citizen rights. All guidelines have been transposed in the national legislations of
member states.
Directive 95/46/EC
Directive related to the protection of individuals with regard to the processing of personal data and on
the free movement of such data. This Directive applies to data processed by automated means (e.g. a
computer database of customers) and data contained in or intended to be part of non automated filing
systems (traditional paper files).
Directive 2002/58/EC
Directive concerning the processing of personal data and the protection of privacy in the electronic
communications sector (Directive on privacy and electronic communications). This Directive tackles a
number of issues of varying degrees of sensitivity, such as the retention of connection data by the
Member States for police surveillance purposes (data retention), the sending of unsolicited electronic
messages, the use of cookies and the inclusion of personal data in public directories.
Regulation (EC) n°45/2001
Regulation concerning the protection of individuals with regard to the processing of personal data by the
Community institutions and bodies and on the free movement of such data. The text includes provisions
which guarantee a high level of protection of personal data processed by the Community institutions
and bodies. It also provides for the establishment of an independent supervisory body to monitor the
application of these provisions.
Decision 92/242/EEC
Decision concerning attacks against information systems. The member states recognized the definitions
and the applicable sanctions for several criminal acts: illegal access to information systems, and illegal
system interference illegal data interference. The Member States will have to make provision for such
offences to be punished by effective, proportionate and dissuasive criminal penalties.
Directive 1999/93/EC
This Directive establishes the legal framework at the European level for electronic signatures and
certification services. The aim is to make electronic signatures easier to use, help them become legally
recognized within the Member States and to secure trans-border recognition of signatures and
certificates from third party countries. The main provision of the Directive States that an advanced
electronic signature based on a qualified certificate satisfies the same legal requirements as a
handwritten signature. It is also admissible as evidence in legal proceedings.
Directive 2001/29/EC
This Directive aims to adapt legislation on copyright and related rights to technological developments
and particularly to the information society. The Directive deals with three main areas: reproduction
rights, the right of communication and distribution rights.
Source: www.europa.eu
© PECB official training – Reproduction prohibited without authorization
130
Section 6: Understanding the organization and clarifying the information security objectives
ISO 27001 and Regulatory Frameworks
Example – International and industry repositories
OECD Principles (2002)
OECD (Organization for Economic Cooperation and Development) has developed guidelines
regulating the security of information systems and networks based on nine principles: awareness,
responsibility, response, ethics, democracy, risk assessment, security design and
implementation, security management and reassessment.
Payment Card Industry Data Security Standard (2004)
The PCI-DSS standard (data security standard for the payment card industry) consists of a series
of technical and operational controls whose goal is to protect organizations against fraud and
other threats related to credit cards. This standard applies to any organization that stores,
processes or transmits information on credit card holders.
Basel II (2004)
Second committee of banking control, the Basel agreements, that issue recommendations
concerning banking legislations and regulations. The goal of this committee is the creation of
international standards for the regulation of banking institutions and systems. Basel II issues 10
principles concerning security which appear in ISO 27001 such as identification, risk assessment
and management, internal audit or even still the emergency plan.
COBIT (1994+)
Developed by the ISACA and the ITGI, CobiT (Control Objectives for Business and related
Technology) is a reference frame to manage the governance of information systems. CobiT
provides information technology managers, auditors and users with indicators, processes and
best practices to help them maximize advantages stemming from the information technologies
recourse and the elaboration of the governance and the control of a company.
ITIL (1980+)
Enacted by the Office of Government Commerce (OGC), Information Technology Infrastructure
Library is a set of works listing best practices for IT Service Management (ITSM).
© PECB official training – Reproduction prohibited without authorization
131
Section 6: Understanding the organization and clarifying the information security objectives
The objectives of a information security management program are the expression of the intent of the
organization to treat the risks identified and / or to comply with requirements of organizational security.
Initially, it is necessary to establish the objectives of ISMS in consultation with the interested parties.
The objectives of the ISMS are needed to determine the scope and must be validated at the highest level of
the organization. Goals can be refined during the project, particularly after the completion of the risk
analysis. It is clear that the objectives should be formally documented.
ISO 27001, clause 6.2 Information security objectives and planning to achieve them
The organization shall establish information security objectives at relevant functions and levels.
The information security objectives shall:
a) be consistent with the information security policy;
b) be measurable (if practicable);
c) take into account applicable information security requirements, and results from risk assessment and risk
treatment;
d) be communicated; and
e) be updated as appropriate.
The organization shall retain documented information on the information security objectives.
When planning how to achieve its information security objectives, the organization shall determine:
f ) what will be done;
g) what resources will be required;
h) who will be responsible;
i) when it will be completed; and
j) how the results will be evaluated.
© PECB official training – Reproduction prohibited without authorization
132
Section 6: Understanding the organization and clarifying the information security objectives
The determination of the objectives should take in consideration:
• historical risk events within the organization;
• current and emerging risk exposures;
• operational disruption trends and prior incidents;
• cost increases and revenue losses arising from potential disruptions;
• risk financing costs;
• liabilities;
• social responsibilities;
• success and failure of other information security projects and programs.
© PECB official training – Reproduction prohibited without authorization
133
Section 6: Understanding the organization and clarifying the information security objectives
Some topics which should be considered when making the initial decisions regarding scope include:
a) What are the mandates for information security management established by organizational
management and the obligations imposed externally on the organization?
b) Is the responsibility for the proposed in-scope systems held by more than one management team
(e.g. people in different subsidiaries or different departments)?
c) How will the ISMS-related documents be communicated throughout the organization (e.g. on paper
or through the corporate Intranet)?
d) Can the current management systems support the organization’s needs? Is it fully operational, well
maintained, and functioning as intended?
To run the ISMS Project, the organization structure should be defined. The initial scope of the ISMS
should be defined at this time to provide management advice to make sound executive decisions. The
preliminary definition of the scope is necessary to create a "business case" and a project plan for
submission to management approval. The result of this step is a document defining the scope of the
ISMS, which includes:
a) a summary of the mandates for information security management established by organizational
management, and the obligations imposed externally on the organization;
b) a description of how the area(s) in scope interact with other management systems;
c) a list of the business objectives of information security management (as derived in clause 5.2);
d) a list of critical business processes, systems, information assets, organizational structures and
geographic locations to which the ISMS will be applied;
e) the relationship of existing management systems, regulatory, compliance, and organization
objectives;
f) the characteristics of the business, the organization, its location, its assets and technology.
The common elements and the operational differences between the processes of any existing
management system(s) and the proposed ISMS should be identified.
© PECB official training – Reproduction prohibited without authorization
134
Section 6: Understanding the organization and clarifying the information security objectives
Establish the ISMS management context
Proud of the growth of their business, the managers of Extreme Adventure Tours suddenly are concerned
about aspects of control and security, especially since there have been some security incidents recently.
Because they know you well and they know you are experts in information security, they will entrust the
mission to you to assist them with the implementation of an information security management system and
to prepare for the ISO 27001 certification.
The first step of your mission is to establish the context of the information security management within the
organization. For him, it seems the jargon of specialists. he wants you to propose a version that he will
approve later.
To achieve this, please identify, based upon the information contained in the case study, which would
potentially be the three sources of compliance requirements for the organization that you consider most
important. Also, please identify which two information assets and two business processes that you consider
most critical for the organization.
Duration of the exercise: 30 minutes
Comments: 15 minutes
© PECB official training – Reproduction prohibited without authorization
135
Section 6: Understanding the organization and clarifying the information security objectives
© PECB official training – Reproduction prohibited without authorization
136
Section 7: Analysis of the existing management system
© PECB official training – Reproduction prohibited without authorization
137
Section 7: Analysis of the existing management system
Main objectives of this step
1. Identify the processes, procedures, plans and measures currently implemented within the
organization.
2. Identify the actual level of compliance to the requirement of the standard and analyze the gap.
3. Evaluate the effectiveness and maturity level of the processes in place within the organization.
Important notes:
• There is no requirement to realize a gap analysis in ISO 27001.
• The analysis of existing management system should be made to avoid work or unnecessary costs, for
example, the duplication of processes or the implementation of unnecessary measures. This action will
help to establish a diagnosis between the existing management system and the requirements of ISO
27001.
© PECB official training – Reproduction prohibited without authorization
138
Section 7: Analysis of the existing management system
List of activities included in PECB IMS2 methodology with the corresponding input and output
Input
• General information about the organization
• Actual documentation on the management system
• Previous evaluation of information security topics (consultant report, audit report, management review,
etc.)
Activities
1. Information gathering about the actual information security practices by the organization with its
processes, plans, procedures and measures currently implemented
2. Gap analysis of current management system compliance and effectiveness against the requirement of
the standard and document the gap
3. Establishing targets and publication of a gap analysis report
Output
• List of the actual information security practices by the organization with its processes, plans,
procedures and measures currently implemented
• Gap Analysis report
© PECB official training – Reproduction prohibited without authorization
139
Section 7: Analysis of the existing management system
The project team should build a detailed knowledge of the existing management system from the collection
of information obtained from multiple stakeholders. An analysis of the existing situation done solely with
experts in the domains (internal experts or by external consultants) would be just as biased as when they
were excluded.
To determine a given state based on a situation at a given moment, the choice of collection method often
depends on the type of data to be collected, the public to interview, the available skills in encoding and
analyzing of the data in the team doing the interviews. And, of course, available resources (time, budget,
etc..). Many methods of data collection are available.
To gather the appropriate information in the organization, it may be useful to conduct the following actions:
• Examination of documents containing information on security controls (security management process,
procedures, description of security controls, security reports, etc..)
• Interviews with people responsible for information security and persons who manage the everyday
operations related to security controls
• Observation of on-site physical security controls
• Review results of internal audits
• Survey by (semi-automatic) questionnaires
Important note: Although some people within the organization may claim that there is no system in place,
this is almost never the case. Although they can be very informal, there is always a series of security
controls in place and in which way they are more or less effectively managed.
© PECB official training – Reproduction prohibited without authorization
140
Section 7: Analysis of the existing management system
Some people might question the value of detailed security questions to people without professional
experience on matters of risks associated with information protection. Experience shows, however, that it is
essential to ascertain the views of stakeholders, expert or not, on its exposure to the resources they
manage. Those responsible for business processes will include a much more "business“ oriented view on
risks, e.g. the public relations officer will indicate his concern about the risk of image damaging and
reputation, etc..
Individual interview
Individual interviews are preferred because the auditor can concentrate on the risk assessment of a single
person. In general, it is possible to obtain more detailed information (contrary to a group interview where
each member gives his summarized opinion) and individual interviews prevent that a dominant member
from the group influences the response of others (“sheep” effect).
The individual interview enables to more easily:
• Read the body language of the individual interviewed
• Identify the sensitive elements of the discussion
• Ensure the confidentiality of discussions with the interviewee
• Adjust the follow-up questions
• Obtain detailed information
• Avoid having dominant members to influence others
Group interview
Group interviews are more effective to establish basic criteria to reach a consensus on risk assessment,
discuss treatment options, etc.. between the different members of a group.
© PECB official training – Reproduction prohibited without authorization
141
Section 7: Analysis of the existing management system
Experience shows that the more you prepare an interview, the more productive the meeting will be. One strategy is to
build a checklist to ensure that interviews are conducted in a systematic and global manner and that appropriate
evidence is obtained. An checklist can include a list of definitions to ensure the uniformity of responses. A checklist
should provide suitable space for answers, comments, and observations. The items included in the checklist should
include the reference to the related standard. The person interviewed can receive the checklist before the meeting. The
checklist allows him to be adequately prepared for the interview.
During the interview, it may be useful to translate the specialized terminology related to information security as "threats"
and “vulnerability" in a language more meaningful for unskilled stakeholders. One can, for example, use the following
wording: "What are you trying to avoid? Or "What do you fear may happen to the resource?"
The interview can be recorded if the person agrees to it. However, the most common practice is simply to take notes.
Recording the interview can be interpreted as intimidating by the person interviewed and that could influence the
interview. Also, we rarely have the time to playback an interview recorded…
The interview notes should contain:
• Function of the interviewee (usually no name except for members of management: confidentiality) and date.
Example: Discussion with employee from information technologies department, September 3, 2006.
• Interview objectives
Example: Validating conformity of the training plan of the organization.
• Summary of evidence collected
The information documented must be gathered in a clear, concise and accurate language. We should only write
facts, not judgements and identify weaknesses. Then, the identified weaknesses will be reported in the gap
analysis. The exact reference to the related standard should be listed with the clause number.
© PECB official training – Reproduction prohibited without authorization
142
Section 7: Analysis of the existing management system
The Gap Analysis is a technique to determine the steps to move from current state to a desired future state.
This is a response to three questions:
• What is our current situation?
• What is the target?
• What is the difference between current and target?
A gap analysis is conducted in three stages:
1. Determine the current state: It is to identify, in the organization, the processes and security controls in
place with their characteristics.
2. Identification of targets: by comparing with other organizations (or other divisions of the organization) to
determine the level of maturity required for each security control (e.g. via the technique of
"benchmarking").
3. Gap analysis: the gap analysis is to identify the gap that may exist between the security controls
currently in place and the requirements of ISO 27001. This allows the organization to identify what are
the current processes that need improvement(s).
The main usefulness of a gap analysis is to provide a basis for identifying and measuring the necessary
investments in time, money, human resources and material resources to achieve the proposed
implementation of the ISMS.
© PECB official training – Reproduction prohibited without authorization
143
Section 7: Analysis of the existing management system
The determination of the current state of the process on the effectiveness and the implemented security
controls can be undertaken by the project team or outsourced to external consultants to the organization.
The advantage of entrusting the analysis to the existing external actors is to receive a report that will
theoretically be more neutral and based on verification with the best practices of the industry. To collect the
data during the analysis phase, the team responsible for this action is obliged to get to know the situation
well. In most cases, much of this analysis will be produced on the basis of responses to structured and
semi-structured questionnaires that will, depending on the choice of the researchers or corresponding to
contextual conditions, be sent in writing (or electronically) or will be done during interviews; this is called
"semi-directive.
When using questionnaires, questions can be:
•
Closed, that is to say they offer a limited choice of answers of which the respondent tick the one(s) of
his choice.
Note: closed questions have the potential to suggest answers that are not spontaneous. They are
especially useful for the study of behavior (nature, frequency etc..). Opinion scales represent a
particular format for closed questions. They provide information on the degree of support for a proposal:
people must position themselves on a "agreement disagreement" scale of several levels.
•
Open, that is to say that the respondent has complete freedom of response.
Note: with open questions one can collect more nuanced, richer, more complete information. But they are
often more difficult to analyze because they generate important content to be exploited by "content
analysis". The response rate to these questions is often less important. They are particularly suitable for the
analysis of opinions and attitudes.
© PECB official training – Reproduction prohibited without authorization
144
Section 7: Analysis of the existing management system
Some tips for drafting your questionnaire:
• Be sure to build short questionnaires. A too long document may make respondents tired. They
might as well skip questions, answer poorly, etc..
• Consider the usefulness of each question. Is it necessary? What use will the answer have?
• Consider their encoding when writing questions: foresee a place to record the identification of
the questionnaire (to find the corresponding computer file), number your questions and
response codes that you use for encoding etc..
• Mix open questions and closed questions,
• Pre-test your questionnaire with one or more members of the target public.
Once the questionnaires answered, it will be necessary to analyze the results. Some methods of
content analysis is quantitative (decomposition, coding, counting, comparisons, correlations etc.)..
Others are qualitative (structural analysis, contextualization, formal analysis). All are quite
complex. Be familiar with it before you build your data collection tools.
© PECB official training – Reproduction prohibited without authorization
145
Section 7: Analysis of the existing management system
ISO 21827 is a standard to improve the software development process. It allows an organization to
measure its level of maturity and ability to develop its software development. This standard is based on the
CMM ® (Capability Maturity Model), originally developed by the Software Engineering Institute at Carnegie
Mellon University. The CMM was designed to measure the quality of services provided by software vendors
of the Department of Defense (DoD) of the United States. This evaluation and development capacity model
is based on a hierarchical grid of five maturity levels (see next slide).
The model proposed by ISO 21827 is now widely used by R&D companies and computer service and
software vendors to evaluate and improve their own product development. This model has subsequently
declined and adapted to other sectors than software engineering including:
•
•
•
•
CMMi (Capability Maturity Model Integration), which determines the practical development and
maintenance of systems and applications.
CMM-TSP (Team Software Process), which specifies standardized practices of a team project.
CMM-PSP (Personal Software Process), which specifies standardized practices of an individual
resource development.
SSE-CMM (Systems Security Engineering Capability Maturity Model) that determines the safety
practices related to information systems.
Many other models and frameworks have adopted the maturity scale CMM. The best known is probably
COBIT, issued by ISACA (Information Systems Audit and Control Association).
© PECB official training – Reproduction prohibited without authorization
146
Section 7: Analysis of the existing management system
To measure, in a precise way, the improvement of the security process during initial
implementation of the ISMS but also during the life cycle of the system, it is interesting to lean on
methodologies such as CMMI. This model allows, according to the key practices in place to
achieve a proactive status for security activities to ensure the service. It is however still
insufficient in itself because it must reckon with the culture of the organization and allow a
significant time for the organization to reach the necessary maturity.
Mapping ISO 27001 on other references of best practices and methods
While many companies have recently taken steps to implement references for IT governance the most often cited ones as CMMI, COBIT and ITIL - this raises the question of coherence and
mapping these with ISO 27000.
Without going into competition, these different standards can complement and enable economies
of scale. For example the implementation of CMMI and ITIL processes facilitates the
implementation of controls of ISO 27002. COBIT, with its approach to risk management is also a
possible choice to aim at implementing ISO 27001. More types of risks are considered than in
ISO 27001 (risks affecting the efficiency, reliability and efficiency of information systems, in
addition to the criteria more oriented toward security such as confidentiality, integrity the
availability or compliance) but the approaches are fundamentally similar.
Generally, we can consider that the ISO 27000 are deepening on the subject of information
security and risk management, which are discussed more succinctly in other references. It is also
worth noting that ISO 20000, the ITIL solution now points directly to the standard ISO 27001 in
regard to the information security management process.
© PECB official training – Reproduction prohibited without authorization
147
Section 7: Analysis of the existing management system
The report should contain at least:
1. A summary description of the observed existing situation;
2. The target of the project;
3. The description of the differences between the situation as presented and the target to be achieved;
4. Various recommendations on how to get there.
© PECB official training – Reproduction prohibited without authorization
148
Section 7: Analysis of the existing management system
0. Non-existent: Total absence of identifiable processes. The company is not aware that this is a problem
to be studied.
1. Initial: It is obvious that the company is aware of the existence of the problem and the need to study it.
However, there is no standardized process, but approaches in this direction tend to be applied individually
or on a case by case basis. There is no global approach organized by the management.
2. Managed: Processes have been developed to a stage where different people performing the same task
are using the same procedures. There is no formal training or communication of standard procedures and
responsibility is left to the individual. It relies heavily on personal knowledge, where a probability of error
exists.
3. Defined: Procedures have been standardized, documented and communicated through training
sessions. However, their use is left to individual initiative, and it is likely that failures can be detected.
Regarding procedures, they are not sophisticated but formalize existing practices.
4. Quantitatively Managed: It is possible to monitor and measure compliance with procedures and take
action where processes appear not to function properly. The processes are constantly improved and
correspond to good practice. Automation and the use of tools are still limited or partial.
5. Optimized: The process has reached the level of best practices, following a steady improvement in
comparison with other organizations (Maturity Model). The computer is used as a way to automate
integrated workflow, providing tools that improve quality and efficiency and make the company adapt
quickly.
© PECB official training – Reproduction prohibited without authorization
149
Section 7: Analysis of the existing management system
For the identification of existing and planned security controls, you can use the list of security controls of
ISO 27002 (or of ISO 27001, Annex A). This helps to get an overview of the existing status in relation to
security best practices.
This document summarizes the gap analysis that was made within the company by highlighting the actions
to be taken first. Its short term objective is to promote the implementation of corrective or preventive
measures for assets with a high risk potential. In the medium and long term the reporting template keeps
track of planned measures and the variance analysis carried out, emphasizing the implemented continuous
improvement in the organization.
© PECB official training – Reproduction prohibited without authorization
150
Section 7: Analysis of the existing management system
A very visual way to present the differences that have been measured (and also very revealing to members
of the management) is to aggregate data from various tests and to present them, at least those that
produce numerical values based on qualitative scales, in a form indicating at a glance what are the positive
elements and improvable ones.
In the "Radar" chart (also called "spider chart") above, there are as many axes as there are categories.
The categories representing the different terms and objectives of the security controls of the 27001
standard, leave all the central point in a classical time sequence. They are shown around the chart (X axis).
The values of the series (here, the values assigned by the analysis of process maturity) are displayed
within the canvas (Y axis) on an scale of 1 to 5.
The presentation in concentric circles shown here may vary depending on whether line segments (lines)
connect the data series, forming a "spider web" whose form will vary depending on the number of sets and
assigned values to each category of the chart.
Advantage of this representation:
• There may be several series in a single graph.
• It is used in various domains to compare a series against another, as superimposed "spider webs" give
a good overview of a situation.
© PECB official training – Reproduction prohibited without authorization
151
Section 7: Analysis of the existing management system
From the information provided in the case study on the functioning of the change management process,
please rate the maturity level of this process. Also, the management of the organization would like to
receive recommendations from you to improve the processes in place to comply with the requirements of
ISO 27001 on change management.
Duration of the exercise: 30 minutes
Comments: 15 minutes
© PECB official training – Reproduction prohibited without authorization
152
Section 7: Analysis of the existing management system
© PECB official training – Reproduction prohibited without authorization
153
Page for Note Taking
© PECB official training – Reproduction prohibited without authorization
154
Page for Note Taking
© PECB official training – Reproduction prohibited without authorization
155
Download