International Standard: Security and Resilience - Security Management Systems - Requirements
International Standard: Security and Resilience - Security Management Systems - Requirements
International Standard: Security and Resilience - Security Management Systems - Requirements
STANDARD 28000
Second edition
2022-03
Reference
number ISO
28000:2022(E)
© ISO 2022
ISO 28000:2022(E)
Copyright International Or g ©an i zIaSt ioOn fo2r S0t a2n 2d a r–d iz Aa t i ol nl vii
ISO 28000:2022(E)
Contents Page
Foreword...................................................................................................................................................................... v
Introduction............................................................................................................................................................... vi
1 Scope................................................................................................................................................................ 1
2 Normative references................................................................................................................................. 1
3 Terms and definitions........................................................................................................................1
4 Context of the organization....................................................................................................................... 4
4.1 Understanding the organization and its context....................................................................4
4.2 Understanding the needs and expectations of interested parties........................................4
4.2.1 General..........................................................................................................................4
4.2.2 Legal, regulatory and other requirements.................................................................4
4.2.3 Principles.......................................................................................................................5
4.3 Determining the scope of the security management system................................................6
4.4 Security management system..................................................................................................6
5 Leadership...................................................................................................................................................... 7
5.1 Leadership and commitment...................................................................................................7
5.2 Security policy..........................................................................................................................7
5.2.1 Establishing the security policy..................................................................................7
5.2.2 Security policy requirements......................................................................................8
5.3 Roles, responsibilities and authorities....................................................................................8
6 Planning.......................................................................................................................................................... 8
6.1 Actions to address risks and opportunities............................................................................8
6.1.1 General..........................................................................................................................8
6.1.2 Determining security-related risks and identifying opportunities..........................9
6.1.3 Addressing security-related risks and exploiting opportunities..............................9
6.2 Security objectives and planning to achieve them.................................................................9
6.2.1 Establishing security objectives..................................................................................9
6.2.2 Determining security objectives...............................................................................10
6.3 Planning of changes................................................................................................................10
7 Support......................................................................................................................................................... 10
7.1 Resources................................................................................................................................10
7.2 Competence.............................................................................................................................10
7.3 Awareness...............................................................................................................................11
7.4 Communication.......................................................................................................................11
7.5 Documented information.......................................................................................................11
7.5.1 General........................................................................................................................11
7.5.2 Creating and updating documented information.....................................................11
7.5.3 Control of documented information..........................................................................12
8 Operation...................................................................................................................................................... 12
8.1 Operational planning and control.........................................................................................12
8.2 Identification of processes and activities..............................................................................12
8.3 Risk assessment and treatment.............................................................................................13
8.4 Controls...................................................................................................................................13
8.5 Security strategies, procedures, processes and treatments................................................14
8.5.1 Identification and selection of strategies and treatments.......................................14
8.5.2 Resource requirements..............................................................................................14
8.5.3 Implementation of treatments...................................................................................14
8.6 Security plans.........................................................................................................................14
8.6.1 General........................................................................................................................14
8.6.2 Response structure........................................................................................................................... 14
8.6.3 Warning and communication....................................................................................15
8.6.4 Content of the security plans.....................................................................................15
ii
Copyright In t ernational Organization for Standardization © ISO 2022 – All rights reserved
ISO 28000:2022(E)
8.6.5 Recovery.....................................................................................................................16
9 Performance evaluation.......................................................................................................................... 16
9.1 Monitoring, measurement, analysis and evaluation............................................................16
9.2 Internal audit..........................................................................................................................17
9.2.1 General........................................................................................................................17
9.2.2 Internal audit programme.........................................................................................17
9.3 Management review...............................................................................................................17
9.3.1 General........................................................................................................................17
9.3.2 Management review inputs.......................................................................................18
9.3.3 Management review results......................................................................................18
10 Improvement............................................................................................................................................... 18
10.1 Continual improvement.........................................................................................................18
10.2 Nonconformity and corrective action...................................................................................19
Bibliography............................................................................................................................................................. 20
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national
standards bodies (ISO member bodies). The work of preparing International Standards is normally
carried out through ISO technical committees. Each member body interested in a subject for which a
technical committee has been established has the right to be represented on that committee.
International organizations, governmental and non-governmental, in liaison with ISO, also take part
in the work. ISO collaborates closely with the International Electrotechnical Commission (IEC) on all
matters of electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see
www.iso.org/iso/foreword.html.
This document was prepared by Technical Committee ISO/TC 292, Security and resilience.
This second edition cancels and replaces the first edition (ISO 28000:2007), which has been technically
revised, but maintains existing requirements to provide continuity for organizations using the previous
edition. The main changes are as follows:
— recommendations on principles have been added in Clause 4 to give better coordination with
ISO 31000;
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
— recommendations have been added in Clause 8 for better consistency with ISO 22301, facilitating
integration including:
— security strategies, procedures, processes and treatments;
— security plans.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.
Introduction
Most organizations are experiencing an increasing uncertainty and volatility in the security
environment. As a consequence, they face security issues that impact on their objectives, which they
want to address systematically within their management system. A formal approach to security
management can contribute directly to the business capability and credibility of the organization.
This document specifies requirements for a security management system, including those aspects
critical to the security assurance of the supply chain. It requires the organization to:
— assess the security environment in which it operates including its supply chain (including
dependencies and interdependencies);
— determine if adequate security measures are in place to effectively manage security-related risks;
— manage compliance with statutory, regulatory and voluntary obligations to which the organization
subscribes;
— align security processes and controls, including the relevant upstream and downstream processes
and controls of the supply chain to meet the organization’s objectives.
Security management is linked to many aspects of business management. They include all activities
controlled or influenced by organizations, including but not limited to those that impact on the supply
chain. All activities, functions and operations should be considered that have an impact on the security
management of the organization including (but not limited to) its supply chain.
With regard to the supply chain, it has to be considered that supply chains are dynamic in nature.
Therefore, some organizations managing multiple supply chains may look to their providers to meet
related security standards as a condition of being included in that supply chain in order to meet
requirements for security management.
This document applies the Plan-Do-Check-Act (PDCA) model to planning, establishing, implementing,
operating, monitoring, reviewing, maintaining and continually improving the effectiveness of an
organization’s security management system, see Table 1 and Figure 1.
Act Maintain and improve the security management system by taking corrective action, based on th
(Maintain and improve)
v i © IS O 2 0 22 – A ll
Copyright In te rnational Organization for Standardization © ISO 2022 – All rights reserved v
Copyright International Or g an i z a t io n fo r S t a n
d a r d iz a t i o n
ISO 28000:2022(E)
This ensures a degree of consistency with other management system standards, such as ISO 9001,
ISO 14001, ISO 22301, ISO/IEC 27001, ISO 45001, etc., thereby supporting consistent and integrated
implementation and operation with related management systems.
For organizations that so wish, conformity of the security management system to this document may
be verified by an external or internal auditing process.
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
Copyright International Or g ©an i zIaSt ioOn fo2r S0t a2n 2d a r–d iz Aa t i ol nl vii
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
1 Scope
This document specifies requirements for a security management system, including aspects relevant to
the supply chain.
This document is applicable to all types and sizes of organizations (e.g. commercial enterprises,
government or other public agencies and non-profit organizations) which intend to establish,
implement, maintain and improve a security management system. It provides a holistic and common
approach and is not industry or sector specific.
This document can be used throughout the life of the organization and can be applied to any activity,
internal or external, at all levels.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO 22300, Security and resilience — Vocabulary
Note 2 to entry: If the organization is part of a larger entity, the term “organization” refers only to the part of the
larger entity that is within the scope of the security management system (3.5).
3.2
interested party (preferred term)
stakeholder (admitted term)
person or organization (3.1) that can affect, be affected by, or perceive itself to be affected by a decision
or activity
3.3
top management
person or group of people who directs and controls an organization (3.1) at the highest level
Note 1 to entry: Top management has the power to delegate authority and provide resources within the
organization.
Note 2 to entry: If the scope of the management system (3.4) covers only part of an organization, then top
management refers to those who direct and control that part of the organization.
3.4
management system
set of interrelated or interacting elements of an organization (3.1) to establish policies (3.6) and
objectives (3.7), as well as processes (3.9) to achieve those objectives
Note 1 to entry: A management system can address a single discipline or several disciplines.
Note 2 to entry: The management system elements include the organization’s structure, roles and responsibilities,
planning and operation.
3.5
security management system
system of coordinated policies (3.6), processes (3.9) and practices through which an organization
manages its security objectives (3.7)
3.6
policy
intentions and direction of an organization (3.1) as formally expressed by its top management (3.3)
3.7
objective
result to be achieved
Note 1 to entry: An objective can be strategic, tactical, or operational.
Note 2 to entry: Objectives can relate to different disciplines (such as finance, health and safety, and environment).
They can be, for example, organization-wide or specific to a project, product and process (3.9).
Note 3 to entry: An objective can be expressed in other ways, e.g. as an intended result, as a purpose, as an
operational criterion, as a security objective, or by the use of other words with similar meaning (e.g. aim, goal, or
target).
Note 4 to entry: In the context of security management systems (3.5), security objectives are set by the organization
(3.1), consistent with the security policy (3.6), to achieve specific results.
3.8
risk
effect of uncertainty on objectives (3.7)
Note 1 to entry: An effect is a deviation from the expected. It can be positive, negative or both, and can address,
create or result in opportunities and threats.
Note 2 to entry: Objectives can have different aspects and categories, and can be applied at different levels.
Note 3 to entry: Risk is usually expressed in terms of risk sources, potential events, their consequences and their
likelihood.
3.9
process
set of interrelated or interacting activities that uses or transforms inputs to deliver a result
Note 1 to entry: Whether the result of a process is called an output, a product or a service depends on the context
of the reference.
2
Copyright International Organization for Standardization
© ISO 2022 – All rights reserved
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
ISO 28000:2022(E)
3.10
competence
ability to apply knowledge and skills to achieve intended results
3.11
documented information
information required to be controlled and maintained by an organization (3.1) and the medium on
which it is contained
Note 1 to entry: Documented information can be in any format and media, and from any source.
3.12
performance
measurable result
Note 1 to entry: Performance can relate either to quantitative or qualitative findings.
Note 2 to entry: Performance can relate to managing activities, processes (3.9), products, services, systems or
organizations (3.1).
3.13
continual improvement
recurring activity to enhance performance (3.12)
3.14
effectiveness
extent to which planned activities are realized and planned results are achieved
3.15
requirement
need or expectation that is stated, generally implied or obligatory
Note 1 to entry: “Generally implied” means that it is custom or common practice for the organization (3.1) and
interested parties (3.2) that the need or expectation under consideration is implied.
Note 2 to entry: A specified requirement is one that is stated, e.g. in documented information (3.11).
3.16
conformity
fulfilment of a requirement (3.15)
3.17
nonconformity
non-fulfilment of a requirement (3.15)
3.18
corrective action
action to eliminate the cause(s) of a nonconformity (3.17) and to prevent recurrence
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
3.19
audit
systematic and independent process (3.9) for obtaining evidence and evaluating it objectively to
determine the extent to which the audit criteria are fulfilled
Note 1 to entry: An audit can be an internal audit (first party) or an external audit (second party or third party),
and it can be a combined audit (combining two or more disciplines).
Note 2 to entry: An internal audit is conducted by the organization (3.1) itself, or by an external party on its
behalf.
Note 3 to entry: “Audit evidence” and “audit criteria” are defined in ISO 19011.
3.20
measurement
process (3.9) to determine a value
3.21
monitoring
determining the status of a system, a process (3.9) or an activity
Note 1 to entry: To determine the status, there can be a need to check, supervise or critically observe.
4.2.1 General
Copyright In 4ternational Organization for Standardization © ISO 2022 – All rights reserved
ISO 28000:2022(E)
4.2.3 Principles
4.2.3.1 General
The purpose of security management within the organization is the creation and, in particular, the
protection of value.
The organization should apply the principles given in Figure 2 and described in 4.2.3.2 to 4.2.3.9.
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
Figure 2 — Principles
4.2.3.2 Leadership
Leaders at all levels should establish unity of purpose and direction. They should create conditions to
align the organization's strategies, policies processes and resources to achieve its objectives. Clause 5
explains the requirements with regard to this principle.
4.2.3.3 Structured and comprehensive process approach based on best available information
A structured and comprehensive approach to security management including the supply chain should
contribute to consistent and comparable results, which are achieved more effectively and efficiently
when activities are understood and managed as interrelated processes functioning as a coherent
system.
4.2.3.4 Customized
The security management system should be customized and proportionate to the organization’s
external and internal context and needs. It should be related to its objectives.
The organization should have an ongoing focus on improvement through learning and experience to
maintain the level of performance, to react to changes and to create new opportunities as the external
and internal context of the organization changes.
Copyright In 6ternational Organization for Standardization © ISO 2022 – All rights reserved
ISO 28000:2022(E)
5 Leadership
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
6 Planning
6.1.1 General
When planning for the security management system, the organization shall consider the issues referred
to in 4.1 and the requirements referred to in 4.2 and determine the risks and opportunities that need to
be addressed to:
— give assurance that the security management system can achieve its intended result(s);
— prevent, or reduce, undesired effects;
— achieve continual improvement.
The organization shall plan:
a) actions to address these risks and opportunities;
b) how to:
— integrate and implement the actions into its security management system processes;
— evaluate the effectiveness of these actions.
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
Copyright In 8ternational Organization for Standardization © ISO 2022 – All rights reserved
ISO 28000:2022(E)
The purpose of managing risks is the creation and protection of value. Managing risk shall be
integrated into the security management system. Risks related to the security of the organization and
its interested parties are addressed in 8.3.
The evaluation of the identified security-related risk shall provide input to (but not be limited to):
a) the organization’s overall risk management;
b) risk treatment;
c) security management objectives;
d) security management processes;
e) the design, specification and implementation of the security management system;
f) the identification of adequate resources including staffing;
g) the identification of training needs and the required level of competence.
The organization shall establish security objectives at relevant functions and levels.
The security objectives shall:
a) be consistent with the security policy;
b) be measurable (if practicable);
c) take into account applicable requirements;
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
d) be monitored;
e) be communicated;
f) be updated as appropriate;
g) be available as documented information.
When planning how to achieve its security objectives, the organization shall determine:
— what will be done;
— what resources will be required;
— who will be responsible;
— when it will be completed;
— how the results will be evaluated.
When establishing and reviewing its security objectives, an organization shall take into account:
a) technological, human, administrative and other options;
b) views of and impacts on appropriate interested parties.
The security objectives shall be consistent with the organization’s commitment to continual
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
improvement.
7 Support
7.1 Resources
The organization shall determine and provide the resources needed for the establishment,
implementation, maintenance and continual improvement of the security management system.
7.2 Competence
The organization shall:
— determine the necessary competence of person(s) doing work under its control that affects its
security performance;
— ensure that these persons are competent on the basis of appropriate education, training, or
experience and are appropriately security cleared;
— where applicable, take actions to acquire the necessary competence, and evaluate the effectiveness
of the actions taken;
Appropriate documented information shall be available as evidence of competence.
NOTE Applicable actions can include, for example: the provision of training to, the mentoring of, or the
reassignment of currently employed persons; or the hiring or contracting of competent persons.
7.3 Awareness
Persons doing work under the organization’s control shall be aware of:
— the security policy;
— their contribution to the effectiveness of the security management system, including the benefits of
improved security performance;
— the implications of not conforming with the security management system requirements;
— their roles and responsibilities in achieving compliance with the security management policy and
procedures and with the requirements of the security management system, including emergency
preparedness and response requirements.
7.4 Communication
The organization shall determine the internal and external communications relevant to the security
management system, including:
— on what it will communicate;
— when to communicate;
— with whom to communicate;
— how to communicate;
— the sensitivity of information prior to dissemination.
7.5.1 General
NOTE The extent of documented information for a security management system can differ from one
organization to another due to:
— the size of organization and its type of activities, processes, products and services;
The organization shall determine the value of information, and establish the level of integrity required
and the security controls to prevent unauthorized access.
When creating and updating documented information, the organization shall ensure appropriate:
— identification and description (e.g. a title, date, author, or reference number);
— format (e.g. language, software version, graphics) and media (e.g. paper, electronic);
— review and approval for suitability and adequacy.
8 Operation
1 2
Copyright I n te r na tiona l Organization for Standardization © ISO 2022 – All rights reserved
ISO 28000:2022(E)
8.4 Controls
The processes listed in 8.2 shall include controls for human resource management, as well as the
design, installation, operation, refurbishment and modification of security-related items of equipment,
instrumentation and information technology, as appropriate. Where existing arrangements are revised
or new arrangements introduced that could have impact on security management, the organization
shall consider the associated security-related risks before their implementation. The new or revised
arrangements to be considered shall include:
a) revised organizational structure, roles or responsibilities;
b) training, awareness and human resource management;
c) revised security management policy, objectives, targets or programmes;
d) revised processes and procedures;
e) the introduction of new infrastructure, security equipment or technology, which may include
hardware and/or software;
f) the introduction of new contractors, suppliers or personnel, as appropriate;
g) the requirements for security assurance of external suppliers.
The organization shall control planned changes and review the consequences of unintended changes,
taking action to mitigate any adverse effects, as necessary.
The organization shall ensure that externally provided processes, products or services that are relevant
to the security management system are controlled.
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
8.6.1 General
The organization shall establish and document security plans and procedures based on the selected
strategies and treatments. The organization shall implement and maintain a response structure that
will enable timely and effective warning and communication of vulnerabilities related to security and
imminent security threats or ongoing security violations to relevant interested parties. The response
structure shall provide plans and procedures to manage the organization during an imminent security
threat or an ongoing security violation.
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
Copyright In
1te4rnational Organization for © ISO 2022 – All rights reserved
ISO 28000:2022(E)
b) assess the impact against pre-defined thresholds that justify initiation of a formal response;
c) activate an appropriate security response;
d) plan actions that need to be undertaken;
e) establish priorities using life safety as the first priority;
f) monitor the effects of any variation in vulnerabilities related to security, changes to the intent and
capability of threat actors or security violations and the organization’s response;
g) activate the security treatments;
h) communicate with relevant interested parties, authorities and the media;
i) contribute to a communication plan with communication management.
For each designated person or team there should be:
— identified staff, including alternates with the necessary responsibility, authority and competence to
perform their designated role;
— documented procedures to guide their actions including those for the activation, operation,
coordination and communication of the response.
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
a) communicating internally and externally to relevant interested parties, including what, when, with
whom and how to communicate;
NOTE The organization can document and maintain procedures for how, and under what circumstances,
the organization communicates with employees and their emergency contacts.
b) receiving, documenting and responding to communications from interested parties, including any
national or regional risk advisory system or equivalent;
c) ensuring the availability of the means of communication during a security violation, vulnerability
or threat;
d) facilitating structured communication with responders to security threats and/or violations;
e) providing details of the organization’s media response following a security violation, including a
communications strategy;
f) recording the details of the security violation, the actions taken and the decisions made.
Where applicable, the following should also be considered and implemented:
— alerting interested parties potentially impacted by an actual or impending security violation;
— ensuring appropriate coordination and communication between multiple responding organizations.
The warning and communication procedures shall be exercised as part of the organization’s testing and
training programme.
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
1) the welfare of individuals;
2) the value of the assets, information and personnel potentially compromised;
3) the prevention of (further) loss or unavailability of core activities.
Each plan should include:
— its purpose, scope and objectives;
— the roles and responsibilities of the team that will implement the plan;
— the actions to implement the solutions;
— the information needed to activate (including activation criteria), operate, coordinate and
communicate the team’s actions;
— internal and external interdependencies;
— its resource requirements;
— its reporting requirements;
— a process for standing down.
Each plan should be usable and available at the time and place at which it is required.
8.6.5 Recovery
The organization shall have documented processes to restore the organization’s security from any
temporary measures adopted before, during and after a security violation.
9 Performance evaluation
Copyright In
1te6rnational Organization for © ISO 2022 – All rights reserved
ISO 28000:2022(E)
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
9.2 Internal audit
9.2.1 General
The organization shall conduct internal audits at planned intervals to provide information on whether
the security management system:
a) conforms to:
1) the organization’s own requirements for its security management system;
2) the requirements of this document;
b) is effectively implemented and maintained.
9.3.1 General
Top management shall review the organization's security management system, at planned intervals, to
ensure its continuing suitability, adequacy and effectiveness.
The organization shall consider the results of analysis and evaluation, and the outputs from
management review, to determine if there are needs or opportunities relating to the business or to the
security management system that shall be addressed as part of continual improvement.
NOTE The organization can use the processes of the security management system, such as leadership,
planning and performance evaluation, to achieve improvement.
10 Improvement
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---
Bibliography
20
Copyright International Organization for Standardization
ISO 28000:2022(E)
--`,`,,,``,```,,`,,,```,``,,,,,,-`-`,,`,,`,`,,`---