Uploaded by Yg Cha

Implement+ISO+27001 2022+Step+By+Step++(1)

advertisement
ISO 27001:2022 Implementation
Step by Step
ISO 27001:2022 Implementation Step by Step
●
Instructor : Dr. Amar Massood
●
Over 33 years of industry experience
●
PhD in Computer Science, 60+ IT certifications
●
ISO 27001 Auditor, Security Plus, CEH, ECSA, CISSP, and CISM
●
Step by step process with templates and tools
●
Easy implementation for small and medium-sized organizations
Why this Course?
Time effective
Learn by example
A lot of templates
Your feedback is important
ISO 27001 Foundation as a Prerequisite
●
This course is about implementation of ISO 27001
●
A minimum knowledge about ISO 27001 is required
●
ISO Foundation by example course is highly recommended
Outline
●
●
●
●
●
●
●
●
●
●
Obtain Management Support
● Operate the ISMS
Define the scope
● Monitor the ISMS
Write ISMS Policy
● Internal Audit
Risk assessment
● Corrective and preventive actions
Identify assets
● Management review
Statement of applicability
Risk Treatment Plan
Define how to measure effectiveness of controls
Implement the controls and mandatory procedures
Implement training and awareness programs
Obtain Management Support
Link the ISMS to profitability (ROI)
Show the benefits of ISO 27001
●
Compliance
●
Retaining customers and winning new business
●
Lowering expenses
●
Improving processes
ROI vs ROSI (Return On Security Investment)
ROI = (Gain from Investment-Cost of investment)/Cost of investment.
Single Loss Expectancy (SLE) : expected money lost during a single incident.
Example : SLE of Loss of laptop can be $2000 or $100 000.
Annual Rate of Occurrence (ARO) : Probability of security incident occurrence in
a year.
Annual Loss Expectancy (ALE) = ARO * SLE
Example of ROSI calculation
●
The Acme Corp is considering investing in an anti-virus solution.
●
Acme suffers 5 virus attacks/year -> ARO=5.
●
Loss of $15000 per attack -> SLE = $15000.
●
Anti-virus solution is expected to block 80% of the attacks.
●
Cost of $25000 : License fees $15000 + $10000 for trainings, installation
Exercise
Echo suffers about 10 Incident/year
Cost of incident is $20000
Mitigation Ratio is 90%
Cost of solution is $50000
Solution
ALE = 10 x $20000
Mitigation Ratio is 90%
Cost of solution is $50000
ROSI = ((10 * 20000) * 0.9 - 50,000) / 50,000 = 260%
Examples of Incidents costs
●
Desjardins group $53 million after exposed personal information
●
Norsk Hydro : $75 million after cyberattack
●
British airways, Marriott : $100 millions after falling foul of GDPR
●
Target : $162 millions after a breach compromised customer’s information
Define the Scope
●
Locations
●
Organizational units
●
Processes and Services
●
Assets, Technologies, Networks and Infrastructure
●
Out of scope
●
Validity
●
Ownership
Example of Scope Definition
●
Locations : Second floor of company headquarters
●
Organizational Units : Finance Department
●
Processes and Services : Contract Management, Accounting Service
●
Networks, IT Assets and infrastructure : IT Systems and network used
for backend finance business
●
Out of scope : cafeteria
●
Validity : 1 year
●
Owner : CISO
A Simpler Form : Four Questions
What business your company is in?
How you earn your money?
What assets are important?
How can information security help?
A Simpler Example of Scope Definition
●
We are a domestic bank with a focus on retail banking.
●
The storage and processing of sensitive customer data is part of our core
business.
●
It is therefore our duty to protect our clients data and our information
assets in relation to confidentiality, integrity and availability.
●
The ISMS applies to the entire organization, our employees as well as
contractors.”
Another Example
●
As a leading company in the development, production and sales in our
products
●
we are highly dependent on the protection of our development and
research data and the availability of our IT systems and processes.
●
That is why information security is very important for our research area,
our production facilities and our sales organization.
Write an Information Security Policy
●
Tailored to the organization
●
Includes the information security objectives
●
Shows the management commitment
●
Must be high level policy
●
Must be communicated
●
Must be reviewed regularly
●
Must have an owner
Example of Policy of a Bank
●
Objectives
○
Protect the organization’s information asset, customer data and transactions
○
Ensure Confidentiality, Integrity, Availability of Information
○
Meet Regulatory and legislative requirements
●
CEO commitment and support
●
Ownership : Board of directors
●
Responsibilities : IT Security department, CISO, employees
●
Policy is communicated by the CISO
●
Should be reviewed every year
Define the Risk Assessment methodology
●
Methodology : A set of rules on how to calculate risks
●
Why do we need a risk assessment methodology?
●
○
Required for compliance
○
Necessary for consistent way to measure risk
○
Everybody is on the same page
ISO 27001 is not perspective
What are Risk Assessment Methodologies?
●
●
Asset Based Risk Assessment
○
Asset register
○
Asser owner
○
Identify threats and vulnerabilities
Event Based Risk Assessment
○
●
Identify risks based on security events
Threat Risk Assessment
○
Analyse IT systems for vulnerabilities
○
Remove potential threats
IT Assets Based Risk Assessment
1.
2.
3.
4.
5.
6.
7.
8.
9.
Identify and Prioritize Assets
Identify Threats and vulnerabilities
Identify risk owners
Analyse controls
Determine the likelihood of incident
Assess the Impact a Threat Could Have
Prioritize the Information Security Risks
Risk Acceptance Criteria
Document the Results
Identify and Prioritize Assets
●
●
Assets valuable to the business
Example of assets
○
○
○
●
●
Seevers, routers, switches …
Customer data, partners documents, trade secrets …
People
Identify asset owners
Prioritize assets according to
○
○
○
The monetary value of the asset
Legal standing
Importance to the organization
Identify Vulnerabilities and Threats
●
●
Vulnerability : Weakness that can be exploited
Identified through
○
○
○
○
●
Vulnerability analysis
Audit reports
Penetration testing
Scanning tools
Threat : Anything that can exploit a vulnerability
○
○
○
○
Hackers
Natural disasters
System failure
Accidental human interference
Example of Threat and Vulnerability
Asset : Paper Document
Threat
Vulnerability
Risk
Theft
Unlocked cabinet
Loss of confidentiality and availability of the
information
Fire
There is no fire suppression
system
Loss of availability of the information
Water damage
Leaky roof
Loss of availability
Another Example of Threat and Vulnerability
Asset : System Administrator
Threat
Vulnerability
Risk
Unavailability
There is no replacement for
potential loss of availability
this position
Frequent errors;
lack of training
potential loss of integrity and availability
Identify Risk Owners
Risk owner : a person or entity with the accountability and authority to
manage a risk.
Example :
Asset owner of a server : System administrator
Risk owner : Head of IT department
Analyse the Current Controls
●
●
●
Controls
○
In place
○
Or planned
Two types of controls
○
Technical
○
Non technical
Should be mapped to Annex A controls when possible
Example
Asset : E-Mail system
Vulnerability : weak password policy
Risk : Loss of confidentiality and availability
Controls : Two factor authentication, password updates, awareness trainings
Annex A : A.5.16 Identity Management, A.5.14 Information transfer
Assess the Likelihood of Incident
Low
likelihood
0
The existing security controls are strong enough, adequate and provide the
required level of protection. We do not expect new incidents to occur in the future.
Medium
likelihood
1
The existing security controls are moderate and have mostly provided the required
level of protection. New incidents are possible, but not highly likely.
High
likelihood
2
The existing security controls are poor or ineffective. Incidents have a high
probability of occurring in the future.
Assess Impact of Incident
Low impact 0
Loss of confidentiality, availability or integrity does not affect the organization's
mission, reputation, or interest; it does affect cash flow, legal or contractual
obligations and may not result in the loss of tangible assets or resources;
Medium
impact
1
Loss of confidentiality, availability or integrity incurs costs and has a low or
moderate impact on legal or contractual obligations, or the organization's
reputation, mission or interest..
High
impact
2
Loss of confidentiality, availability or integrity has considerable and/or immediate
impact on the organization's cash flow, operations, legal or contractual obligations,
or its mission and reputation.
Risk Calculation Matrix and Acceptance Criteria
Risk = Impact + Likelihood
Impact
2
2
3
4
1
1
2
3
0
0
1
2
0
1
2
Likelihood
Risk Calculation Matrix and Acceptance Criteria (2)
Impact
High
Medium
High
High
Medium
Low
Medium
High
Low
Low
Low
Medium
Low
Medium
High
Likelihood
Document the Results
No
Asset
name
Asset owner
Vulnerability
Threat
Likelihood
Impact
Risk
Rating
1
Data
Center
Network
Administrator
Location sensitive
to Earthquakes
2
Accounting
Software
Support
Manager
3
Accountant
Computers
4
5
Risk Owner
Existing
controls
Damage
High
2
High
2
High
4
Network
Administrator
None
Undocumented
Software
Developers
Resignation
High
2
High
2
High
4
Support
Manager
None
Accountants
Single copy of
data
Loss of data
Low
0
High
2
Medium
2
Accountants
Occasional
backup
Accounting
Software
Support
manager
No deactivation of
user accounts
Unauthorized
access to
sensitive data
Medium
1
Medium
1
Medium
2
Support
manager
Ad hoc
Servers
System
Administrator
Air conditioning
systems is 12
years old
System failure
— Overheating
in server room
High
High
2
High
2
High
4
System
Administrator
Old A/C
systems
Example of Statement of Statement of Applicability
Control
Description
Applicable
Justification
A.5.29
Implementing Information
Security Continuity through
Physical or technical controls
Yes
Risk 1: Disaster recovery
site is needed because of
probability of earthquake
Not implemented
A 8.32
System Change Control
Procedures : To avoid
compromising systems by the
implemented change through
poor development
Yes
Risk 2 : The undocumented
accounting software is due
to lack of poor change
control
Not implemented
Back-up copies of information
and software shall be taken
and tested regularly in
accordance with the agreed
backup policy.
Yes
Risk 3: Single copy of data,
risk of data loss.
Implement through backup
procedure
Not implemented
Access rights should be
removed upon termination or
adjusted upon change of
roles.
Yes
Risk 4: User accounts on
accounting software are not
removed or deactivated
according to clear
procedure
Implemented through
access right revocation
procedure
Not implemented
A.8.13
A 5.15
Implementation Method
Status
ISO 27001 Annex A Controls
This course is on ISO 27001 Implementation
Check our course dedicated to ISO 27001 Annex A Controls
Total of 7 hours
114 Controls with guidelines and examples
Risk Treatment Plan
Risk Treatment Plan has to be implemented and documented
●
Which controls to implement
●
Who is responsible for them
●
What are the deadlines
●
Which resources are required
Risk Treatment Options
● Decrease the Risk
○
Example : installing an antivirus on users’ PCs to protect them from malware
● Avoid the Risk
○
Example : Not allowing employees to work from home to avoid the related threats
● Transfer the Risk
○
Example : Buy an insurance policy
● Accept the Risk
○
Example : Accepting the risk that the main switch can break without having
redundancy
Risk Treatment Plan
Control to be implemented
Risk reference
Responsible
person
Start/End
Date
Resources
Status
A.5.29 : A cloud based
disaster recovery site outside
the country
Risk 1 : probability of
earthquake
Infrastructure
Manager
01/08/2020
01/11/2020
Financial. To be evaluated.
Not implemented
A 8.32 : System Change
Control Procedure
Risk 2 : The
undocumented
accounting software
Change
Manager
02/05/2020
15/05/2020
10 days work
Not implemented
A.8.13: Create a backup
policy.and documented
procedure and implement it
Risk 3: Single copy of
data, risk of data loss.
System
administrator
10/03/2020
22/03/2020
Financial : buy 5 SAN disks
Work :12 days
Not implemented
A.5.15 : Write an Access
control policy and
documented procedure for
access right removal
Risk 4: User accounts
removed
CISO
01/03/2020
04/03/2020
3 days work
Not implemented
Monitoring, Measurement, Analysis and Evaluation
Organisation should provide
●
●
Metrics for the ISMS performance regarding
● Compliance with standard
● Alignment with policies
● Achievement of objectives
Take into consideration
■
■
■
■
●
What need to be monitored and measured (e.g., Incident Management Procedure)
Methods of monitoring and measurement (e.g., Reports)
Frequency to perform monitoring and evaluation (e.g., Real time monitoring,
Monthly reports)
Who is responsible (e.g., System administrator)
Performance results should be retained
Examples of measurements
●
Number of information security incidents
●
Number of security breaches
●
Duration of service interruption
●
MTTRS : Meantime to restore service
●
Number of security related downtimes
●
Accomplishment of information security objectives
Effectiveness Measurement
Control
Description
Measurement
Responsible
A.5.29
Implementing Information Security
Continuity through Physical or technical
controls
Proportion of recovery exercises that
are successfully conducted
Infrastructure Manager
A 8.32
System Change Control Procedures : To
avoid compromising systems by the
implemented change through poor
development
Proportion of successful changes
following the change control
procedure
Change manager
Back-up copies of information and
software shall be taken and tested
regularly in accordance with the agreed
backup policy.
Effectiveness will be measured against
whether the backup policy is being
applied across the relevant area
System administrator
Access rights should be removed upon
termination or adjusted upon change of
roles.
Proportion of removed accounts upon
termination or role change
CISO
A.8.13
A 5.15
Reminder
This is not beginner course
ISO 27001 Foundation by example
ISO 27001 Annex A : Information Security Controls Explained
Implement Controls and Mandatory Procedures
ISO 27001 is not prescriptive on grouping controls into policies and procedures
Two approaches
Big companies : A policy for each section of Annex A, A procedure for each control
Example of policy : Asset Management Policy (A.8), Access Control Policy (A.9)
Example of procedure : A.8.1.1. Asset inventory procedure, A.8.1.3.4 Asset return procedure
Small companies : A policy or procedure that covers many controls in one document
Example : Supplier relationship policy that covers all the five controls of section A.15
List of Mandatory Documents
●
Scope of the ISMS
●
Definition of security roles and responsibilities
●
Information security policy and objectives
●
Acceptable use of assets
●
Risk assessment and risk treatment methodology
●
Access control policy
●
Inventory of assets
●
Operating procedures for IT management
●
Statement of Applicability
●
Secure system engineering principles
●
Risk treatment plan
●
Supplier security policy
●
Risk assessment report
●
Incident management procedure
●
Business continuity procedure
●
Statutory, regulatory, and contractual requirements
List of Mandatory Records
●
Records of training, skills, experience and qualifications (clause 7.2)
●
Monitoring and measurement results (clause 9.1)
●
Internal audit program (clause 9.2)
●
Results of internal audits (clause 9.2)
●
Results of the management review (clause 9.3)
●
Results of corrective actions (clause 10.1)
●
Logs of user activities, exceptions, and security events (clauses A.12.4.1 and A.12.4.3)
Information Security Roles and Responsibilities
The responsibilities for information security have to be defined and allocated.
Example :
●
Top Management : define strategy, goals and scope of the ISMS, leadership, assign
responsibilities, provide resources, management review
●
Chief Information Security Officer : define the ISMS, communication, contact of
authorities, coordinate risk management
●
IT Administrator : define, implement and maintain devices, supervise access rights,
respond to threats, raise awareness
●
Internal Auditor : Participate in the Audit Management Process, Prepare and distribute
the Audit Report, Assess Organization’s compliance with approved security measures in
Statement of Applicability, Prepare audit criteria to increase its quality
Acceptable use of Assets Policy
●
Define and Document the rules of acceptable use of assets
●
Implement appropriate controls and communicate security requirements
●
Rules for Mail and internet usages
●
Guidelines for use of mobile devices
●
And other specific specific rules or guidance
Example of Acceptable Use Policy
Purpose : outline acceptable use of computer equipment
Scope : Use of information, computing devices and network resources
Policy
●
●
●
●
●
●
Information is the property of the company
Responsibility to report theft of information
Access information to fulfill duties
Reasonableness of personal use of internet
Authorized monitoring network traffic
Right to audit networks to ensure compliance
Access Control Policy
●
●
●
●
Establish, document and regularly review an access control Policy
Assets owners should determine appropriate access controls rules and
rights
Access controls are logical and physical
Policy should take account of
○
○
○
○
○
○
○
○
Security requirements of business applications
Consistency with information classification Policy
relevant legislation and any contractual obligations
segregation of access control roles, e.g. access request, access authorization, access
administration
requirements for formal authorization of access requests.
requirements for periodic review of access rights
Removal of access rights
Arching of records of events of use of user identities
Example of Access Control Policy
Purpose : Provide authorized access and preserve confidentiality, integrity and
availability of data
Scope : All networks, IT system, data and authorized users
Out of scope : External website and other information classified as ‘Public’.
Policy
●
●
●
●
●
●
Generic identities are not permitted
The allocation of privilege rights shall be restricted upon request from a senior manager
Least privilege and need to know principles
Unique user account and complex password
Use of access cards for physical access
Regular review of this policy
Secure System Engineering Principles
Secure system engineering principles must be established and documented,
selected and applied during development
●
Secure system engineering procedures
●
Security should be designed into all architecture layers
●
Security engineering principles should be regularly reviewed
●
Security engineering principles should be applied to outsourced systems
●
Security engineering principles should be applied in development
Examples of Secure System Engineering Principles
1.
Treat security as an integral part of the overall system design.
2.
Ensure that developers are trained in how to develop secure software
3.
Assume that external systems are insecure
4.
Protect information while being processed, in transit, and in storage
5.
Where possible, base security on open standards for portability and interoperability
6.
Implement layered security
7.
Isolate public access systems from mission critical resources
8.
Implement least privilege
9.
Ensure proper security in the shutdown or disposal of a system.
Information Security Policy for Supplier Relationship
A policy to mitigate the risks on information assets accessible by suppliers.
●
●
●
●
●
●
●
●
Identifying and documenting the types of suppliers
A standardized process and lifecycle for managing supplier relationships
Defining the types of access that different types of suppliers will be allowed
Minimum security requirements for each type of information and type of access
Processes and procedures for monitoring adherence to security requirements
Accuracy and completeness controls to ensure the integrity of the information
Obligations applicable to suppliers to protect the organization’s information
Handling incidents and contingencies associated with supplier access
Information Security Policy for Supplier Relationship (2)
●
Resilience, recovery to ensure the availability of the information
●
Awareness training for the organization’s personnel
○
Involved in acquisitions regarding applicable policies …
○
Interacting with supplier personnel regarding appropriate rules of engagement
●
Conditions of information security requirements and controls in agreement
●
Managing the necessary transitions of information and information
processing facilities
Example of Supplier Information Security Policy
Purpose : put in place procedures so that contracts and dealings between the Council
and third party suppliers have acceptable levels of data protection.
Scope : Applies to contracts, service arrangements that involve IT solutions which
require access to, or the processing of, personal data.
Policy Statement
●
●
●
●
●
Use of risk based approach on how protect data
Returns of assets, Removal of access
Monitor and review of supplier services at least once a year
Validity : 1 year or when needed
Owner : Contract manager
Incident Management Procedure
●
Reporting Information Security Events, Weakness and incidents
●
Assessment of and Decision on Information Security Events
●
Response to Information Security Incidents
●
Learning from Information Security Incidents
●
Collection of Evidence
Example of Incident Management Procedure
Purpose : Quick and consistent detection of security events and weaknesses,
and quick response to security incidents.
Scope : all assets and employees within the ISMS scope, suppliers
Procedure
Reporting incidents : all users and contractors must report incidents, weaknesses and security events
to the system administrator by phone or in person.
Assessment : CISO must analyse the information and suggest remediation or preventive action
Response to minor incidents : Containment of the incident, investigate what occurred and how,
corrective actions.
Response to major incidents : Use Business Continuity Procedure if the business is interrupted.
Example of Incident Management Procedure (2)
Learning from security incidents : CISO must review the incident and improve the ISMS processes if
required, identify recurring incidents and take corrective actions
Collection of evidence : the CISO responsible of the
●
Collection of evidence
●
Chain of custody
●
Safety of evidence
●
Safety of personnel
Business Continuity Procedures
Planning Information Security Continuity : a disaster recovery process or business
continuity plan should be put in place.
Implementing Information Security Continuity : Implement required policies,
procedures and physical or technical controls
Verify, Review & Evaluate Information Security Continuity : At regular interval to
ensure the plan is still valid and maintained against changes
Availability of Information Processing Facilities : implement redundancy to ensure
that fail-over will be achieved in a reasonable time-frame
Disaster Recovery Plan
●
Purpose: Inventory IT infrastructure & steps
●
Scope: Applies to all IT infrastructure
●
Team: IT manager, network admin, staff
●
Risk assessment: Identify disasters & impact
●
Recovery strategy: Recover IT, restore data, ensure continuity
●
Procedures: Backup, store offsite, restore data
●
Testing & updating: Regularly tested & staff trained
●
Documentation & review: Regularly reviewed for relevance
Backup Procedure
●
Purpose: Safeguard data availability, integrity
●
Scope: Define covered systems, data
●
Roles: Assign responsibilities, involved individuals
●
Schedule: Frequency, timing, backup types
●
Verification: Test backups, disaster recovery
●
Documentation: Logs, procedures, training
Statutory, Regulatory and Contractual Requirements
●
Statutory, regulatory, and contractual requirements must be considered
●
Statutory requirements are mandatory laws and regulations.
●
Regulatory requirements are specific to industries or sectors.
●
Contractual requirements are obligations in contractual agreements.
●
Compliance with requirements is mandatory and failure can lead to legal action.
●
ISMS must align with requirements to ensure compliance and mitigate risk.
Example
●
Statutory requirements: EU GDPR (applies to all orgs processing personal
data of EU residents).
●
Regulatory requirements: HIPAA (applies to healthcare industry in the US).
●
Contractual requirements: compliance with ISO 27001 as a requirement
from a client.
Implement Training and Awareness Program
Formal induction process including introduction to
●
●
Security Policies
Expectations
Continual training should include
●
●
●
●
Security requirements
Legal responsibilities
Business controls
Correct use of facilities
Example of Awareness Program
Awareness raising activities
●
●
●
●
Campaigns : Information security day
Issuing booklets
Newsletters
Email alerts
Can use different delivery media
●
●
●
Classroom based
Distance learning
Self paced
Operate the ISMS
Day to day routine
Records generated from Procedure execution
Examples :
●
Records of training, skills, experience and qualifications
●
Results of internal audits
●
Logs of user security incidents
●
Logs of access requests
●
Log an asset purchase
Monitor the ISMS
● What needs to be monitored and measured;
● The methods for monitoring and measurement;
● When the monitoring and measurement shall be undertaken;
● Who shall undertake the monitoring and measurement results.
Internal Audit
●
Audits are performed at planned intervals
●
Auditors should be independent
●
Audit program should be documented
●
Criteria and scope must be defined
●
Non conformities should be reported
●
Audit program and records should be retained
Internal Audit Program
Audit Period
Scope
Criteria
Method
Auditors
Q1 2023
HR
Department
HR information
system security
Interview, documentation
review, vulnerability
scanning
John Doe, Jane
Smith
Q1 2023
Finance
Department
Financial data
protection and
privacy
Interview, documentation
review, penetration testing
John Doe, Jane
Smith
Steps of Internal Audit
1.
Document Review
2.
Create checklist
3.
Write the audit plan
4.
Main Audit
5.
Reporting
6.
Corrective actions
7.
Follow-up
Document Review
●
●
Purpose
○
Check the documentation
○
Get familiar with the Organization
What to do
○
Read all documents
○
Write what to check in main audit
○
Note nonconformities
The Audit Plan
Time
Department
Process
Contact
Clause
08:00
IT
Access Control
Operations Manager
Annex A 5.15
10:00
HR
Screening
Awareness and Training
HR Manager
Annex A. 6.1, 6.3
Internal Audit Checklist
Clause
Requirement of the standard
A.8.3
Backup policy (clause A.8.13)
Backup logs
A.5.9
Inventory of Assets
The asset register exists and
contains assets observed
6.3.1
Is Statement of Applicability created?
Change control procedure
6.1.3
Does Risk treatment plan exist?
Business continuity procedures
Compliant (Yes/No)
Evidence
Tha Main Audit
●
Main audit assesses organization's compliance
●
Use checklist to verify compliance
●
Check evidence to support compliance
●
Observe how ISMS works in practice
●
Interview staff to verify compliance
●
Perform audit tests to validate evidence
Report : Internal Audit Findings
Nonconformity : Non-fulfillment of a requirement
Observation : Not enough evidence for a Nonconformity
Report document is mandatory
Internal Audit Report :
●
●
●
Header
Nonconformities
Observations
Examples of Nonconformities
The failure to comply with clause 4.1 lack of defining the scope
No ISMS policy,
No risk assessment,
Absence of statement of applicability
Failure to comply with Clause 7: Management review of the
ISMS.
● Failure to comply with the Internal ISMS audit (Clause 6)
●
●
●
●
●
Corrective actions
In the event of nonconformity
●
●
●
●
Take action to correct it
Deal with the consequence
Review effectiveness of corrective action
Documentation
Evaluate the need for action to eliminate causes by
●
●
●
Review of the nonconformity
Determine the cause
Determine if similar non conformity exist or may occur.
Example of corrective action
Nonconformity : 2 of 100 PCs have no antivirus installed
Corrective action : install antivirus on the 2 PCs
Cause : finance department buy its own PCs directly
Similar non conformities : check if any other departments are buying their PCs
directly.
Root cause corrective action : set up a procurement process for PCs and
enforce it.
Follow up
●
Challenge: ensure timely corrective actions
●
Schedule corrective actions by responsible persons
●
Verify resolution of nonconformities
●
Document resolution through corrective action form
●
Conduct small audits for unresolved issues
Management Review
●
Importance of management reviews
●
Previous actions: Review status, ensure implementation
●
Nonconformities: Address, implement corrective actions
●
Monitoring results: Assess system effectiveness
●
Improvement opportunities: Identify, address areas
●
Documented evidence: Retain, securely store records
Conclusion
●
Comprehensive, easy-to-understand course
●
Covers management support, ISMS scope
●
Risk assessment, asset identification
●
Selecting controls, risk treatment plan
●
Procedures, monitoring, internal audits
●
Tailored support, values feedback
Download