Isms 01
Isms 01
Isms 01
• Information Security
• Plan Do Check Act cycle and ISMS
• Implementation of an ISMS
• Awareness training
• Certification to ISO/IEC 27001:2005
Stages in the implementation of ISMS (1)
Client/Customer/Stakeholder – requirement of
contract/condition for Invitation to Tender.
Plan
Establish
ISMS
Do Act
Interested
Implement Maintain
Interested Parties
and and
Parties operate improve
the ISMS the ISMS
Information Monitor
security and
requirements Managed
review Information
and the ISMS
expectations Security
Check
Clause 4 Information Security Management System
Customer
satisfaction
Outsourced services
Couriers
Research Total organization
HR
Area covered by scope Administration
Operations
-Evaluation Maintenance
-Appraisal Rpt suppliers
Supervision
-Approval
Utilities
-Letter of offer
Marketing -Documentation IT
-Disbursement
Legal
Finance
Insurance
Customer
needs Outsource
Suppliers
suppliers
Network Diagram
Internet WAN
Router Router
FW Router
IDS
Switch Switch
Servers
Servers
Hubs Hubs
PCs
PCs
Printer Scanner
Hardware and Software Listing
Process
A set of interrelated or interacting activities which transforms
inputs from outputs.
Processes
Specifications/Criteria Changes
Resources
Information
Methods
No
Review
Output
Output Achieved
Interested Parties
Managed Information Security Yes
Holistic view
Top Management
Measure business performance
A process A process
Process Owner
measure efficiency/
effectiveness of process
Step 2 – Define an ISMS Policy
ISMS Policy
• Internal
– Security Policy communicated to all staff
– Levels of policy – more than one
– Sub policies
• External
– Identifying organization’s management of information security
to interested parties, i.e. customers
Key Elements to an Information Security Policy
• Easy to understand
• Applicable
• Easy to implement
• Enforceable
• Meet business objectives
Step 3 – Define the Risk Assessment
Approach of the Organization
Risk Assessment Approach (1)
Identify:
• Assets and owners of assets within the scope of the ISMS
• Threats to those assets
• Vulnerabilities that might be exploited by the threats
• Impacts that losses of confidentiality, integrity and
availability may have on the assets
Risk Assessment Process
• Asset
– Anything that has value to an organization
• Information assets
• Paper documents
• Software assets
• Physical assets
• People
• Company image and reputation
• Services
Asset Examples (1)
• Value identified:
– Express business impacts if CIA and other important property
of the asset is damaged
• Example valuations:
– Negligible – low – medium – high – very high
– 1–2–3–4–5
– 0–1–2–3–4
– Confidentiality
– Integrity
– Availability
Threat
• A potential cause of an unwanted incident which may result in
harm to a system or organization
Vulnerability
• A weakness of an asset or group of assets, which can be
exploited by a threat
• A vulnerability in itself does not cause harm, it is merely a
condition or set of conditions that may allow a threat to affect
an asset
Example Threats
Example 1
• A virus can destroy all the files on your computer system
but the risk is low provided you have taken the necessary
precautions, e.g. virus checked your drives and
accessories.
Example 2
• Accidental disclosure of your commercially sensitive
information to competitors could happen via your email
system but the risk of exposure can be reduced by
appropriate staff training on the use of email and staff
awareness on how to handle such information.
Evaluating Risk Assessment Methods
Considerations:
• Does it identify vulnerabilities and threats?
• Does it attempt to evaluate likelihood of such a security
failure occurring?
• Would someone else using the same data arrive at the
same results?
• Is the process repeatable and sustainable?
• Does it allow for analysis of impact of changes?
Deliverables from the Risk Assessment
Levels of Threat L M H
Levels of
Vulnerability L M H L M H L M H
0 0 1 2 1 2 3 2 3 4
1 1 2 3 2 3 4 3 4 5
Asset Value 2 2 3 4 3 4 5 4 5 6
3 3 4 5 4 5 6 5 6 7
4 4 5 6 5 6 7 6 7 8
Ranking of Incidents by Measures of Risk
Incident A 5 2 10 2
Incident B 2 4 8 3
Incident C 3 5 15 1
Incident D 1 3 3 5
Incident E 4 1 4 4
Incident F 2 4 8 3
Assessing the Risks for Systems
Asset value
(Potential damage) 0 1 2 3 4
Incident frequency
value
0 0 1 2 3 4
1 1 2 3 4 5
2 2 3 4 5 6
3 3 4 5 6 7
4 4 5 6 7 8
Distinction Between Acceptable and Not Acceptable
Risks
Damage Value 0 1 2 3 4
Incident
Frequency Value
0 A A A A N
1 A A A N N
2 A A N N N
3 A N N N N
4 N N N N N
Key:
A = Acceptable
N = Not acceptable
Security Risk – Calculations
0 Introduction 0 Introduction
1 Scope 1 Scope
2 Normative references 2 Terms & definitions
3 Terms & definitions 3 Structure of this standard
4 Risk assessment & treatment
Clauses 4 to 8
Annex A Control objectives & controls
Control objectives & controls 5 to 15
A.5 to A.15
Annex B OECD principles Bibliography
Annex C Correspondence between Index
standards
Control Objectives and Controls (1)
A.5
A.6
A.15 Security
Policy
Organization of
Compliance Information
Security
A.7
A.14
Business Asset
Continuity Management
Management
Control Objectives
Information Human Resources
A.13 Security Incident and Controls Security A.8
Management
A.11 A.10
Selection of Security Controls (1)
– Remove
– Improve
Prepare a
Statement of Applicability
Statement of Applicability (1)
Definition
Documented statement describing the control objectives and
controls that are relevant and applicable to the organization’s
ISMS.
Statement of Applicability (2)
Clause 4.2.2
Implement and Operate the ISMS
(DO)
Implement and Operate the ISMS
Clause 4.2.3
Monitor and Review the ISMS
(CHECK)
Monitor and Review the ISMS (1)
Clause 4.2.4
Maintain and Improve the ISMS
(ACT)
Maintain and Improve the ISMS
4.3.1 General
• Minimum documentation identified
Framework of
understanding Guidelines Tools to do it
and working
Policy Statement
• Information and data stored on laptop or portable computers must
be backed up regularly. It is the responsibility of the user to ensure
that this takes place on a regular basis
Explanatory note:
• Backing up data held on portable computing devices, is means to
protect against loss
Policy Statement:
• This organization expects all employees to operate a clear desk policy
Explanatory note:
• With open plan offices now common, you may accidentally expose confidential
material. Information can be read from papers on your desk, especially when you
are away from your desk. A clear desk policy is an effective safeguard
Clauses 5, 6, 7 and 8
Clause 5 Management Responsibility
• Documented procedure
• Actions taken on non-conformances and causes
• Follow up verification
Clause 7 Management Review of the ISMS
7.1 General
• Review at planned intervals
• Control A.14
• Business Continuity Management Process
• Business Continuity and Risk Assessment
• Developing and Implementing Continuity Plans
• Business Continuity Planning Framework
• Testing, Maintaining and Re-assessing Business
Continuity Plans
Typical Disaster Phases
Crisis
Within the first few hours after the incident starts. For example,
caused by ongoing damage to premises, or restricted access to
building, systems not operating, etc
Emergency Response
May last for a few minutes or a few hours following the crisis stage.
During this time, the situation has to be assessed and decisions
made quickly to aid rapid recovery, etc
Recovery
This may last several months following the disaster. It ends when
normal operations can restart. During this phase, essential or primary
operations will restart and continue in recovery format
Restoration
Conditions restored to normal. Planning for this phase might start
within a few days of the actual incident. If there was physical damage
to the premises, this phase will not occur
BCP can effectively prevent chaos in a crisis
Stages of BCM
Phases of the BCP
Business Continuity Management
2. Avoid listing
6. Show simple media
individuals by name.
Holding statements.
Tasks and functions
Avoid ‘no comment’
are more important
• Electronic:
– Stand alone
– Intranet
• Manual:
– Paper
• Ensure:
– All Clauses 4 to 8 defining the set of processes for the
ISMS implemented
– Appropriate Controls A5 to A15 implemented
• Training
– Initial awareness
– Ongoing
– Specific policies
• Internal ISMS audits
– Competent auditors (internal/external)
– Audit process and reporting
• Management Review
– Regular basis
– Scope remains adequate
– Improvements in ISMS process are identified
Re-evaluating the System
Certification
Assessment and Certification
Pre-assessment (optional)
Pre-
Stage 1 – Documentation Audit certification
Continuing Surveillance
Post-
3-Year Re-assessment certification
Stage 1 – Documentation Audit
Example 1
• The management of information security of the business
operations including security consultancy and supply of
security software tools. This is in accordance with the
Statement of Applicability, issue 1.00
Example 2
• Network services (ISP, Hosting), Design and Construction
of Network, Development of Internet Website, all in
accordance with Statement of Applicability, version 3.01
ХВАЛА НА ПАЖЊИ