Risk3sixty - The Business Case For ISO 27001 (Part 1)
Risk3sixty - The Business Case For ISO 27001 (Part 1)
Risk3sixty - The Business Case For ISO 27001 (Part 1)
The Path to
Certification (Part 1)
The Business Case for ISO
27001 Implementation
4 Context of the organization - understand the A.9 Access Control – Defines requirements for user
organizational context, the needs and expectations of access management throughout the user lifecycle.
‘interested parties,’ and defining the scope of the ISMS. A.10 Cryptography – Defines requirements for
5 Leadership - top management must demonstrate cryptographic controls and key management.
leadership and commitment to the ISMS, mandate A.11 Physical and Environment Security
policy, and assign information security roles,
responsibilities and authorities. A.12 Operations Security – Defines requirements for
security operations such as system security, backup,
6 Planning - outlines the process to identify, analyze logging, malware, and vulnerability management.
and plan to treat information risks and clarify the
objectives of information security. This is the first clause A.13 Communications Security – Define requirements
that requires a risk assessment. for network security and information transfer.
7 Support - adequate, competent resources must be A.14 System Acquisition, Development and
assigned and awareness raised. Maintenance – Defines requirements for security in the
system development and change management lifecycle.
8 Operation - additional detail about assessing and
treating information risks, managing changes, and A.15 Supplier Relationships – Defines requirements for
documenting requirements. security as related to vendors.
9 Performance evaluation - monitor, measure, analyze A.16 Informaiton Security Incident Management –
and evaluate/audit/review the information security Defines requirements for management of security
controls, processes and management system, incidents.
levels of government.1
10000
1 Find whitepapers on each of these regulations on our website: 3Data source of all figures via ISO.org:
https://www.risk3sixty.com/category/whitepapers/ https://isotc.iso.org/livelink/livelink?func=ll&objId=18808772&objAction=br
2 Harvard Business Review: https://hbr.org/2017/11/the-avoidable-mistakes- owse&viewType=1
executives-continue-to-make-after-a-data-breach
PCI DSS
HIPAA
Let’s Get Started
HITRUST
Contact a Professional
Leveraging this strategy, companies can gain significant Christian Hyatt, Managing Director
efficiencies by managing a single set of controls rather CISA | CISM | ISO 27001 Lead Auditor | PCI QSA
than managing each compliance requirement in a silo. Christian.Hyatt@risk3sixty.com
Unifying compliance efforts may also result in a 404.333.1669
reduction in external audit fees and will certainly reduce
the burden on internal teams faced with producing Christian White, Managing Director
audit evidence throughout the year. CISA | CRISC | ISO 27001 Lead Implementer| PCI QSA
Christian.White@risk3sixty.com
Next Steps 770.289.3505