Checklist Implementasi ISO 27k
Checklist Implementasi ISO 27k
Checklist Implementasi ISO 27k
Dokumentasi
Klausul ISO 27001:2013 Prasyarat Standar ISO 27001:2013 Bukti Pelaksanaan / Records Aktivitas
(Kebijakan/Pedoman/Prosedur)
4. CONTEXT OF THE ORGANIZATION
The organization shall determine external and
internal issues that are relevant to its purpose and
Understanding the organization
4.1 that affect its ability to achieve the intended 1.
and its context
outcome(s) of its information security management
system
5. LEADERSHIP
ISMS Policy
3.
Dokumentasi
Klausul ISO 27001:2013 Prasyarat Standar ISO 27001:2013 Bukti Pelaksanaan / Records Aktivitas
(Kebijakan/Pedoman/Prosedur)
Kebijakan, Pedoman, Prosedur terkait ISMS
Top management shall establish an information di lingkup SQG OCBC-NISP
5.2 Policy Bukti pelaksanaan Sosialisasi 2.
security policy. * Daftar dokumen ada di Document
Controller
6. PLANNING
Actions to address risk and
6.1
opportunities
1. Risk Profile
When planning for the information security
management system, the organization shall consider
the issues referred to in 4.1 and the requirements 2. Statement of Applicability (SoA)
6.1.1 General
referred to in 4.2 and determine the risks and
opportunities 3. ISMS Objectives
that need to be addressed
Program Implementasi / Rencana
4.
Kerja ISMS
Information security risk The organization shall define and apply an Risk and Control Self Assessment Sub
6.1.2 Risk Register 1.
assessment information security risk assessment process Policy
ISMS Objectives 1.
Information security objectives and The organization shall establish information security
6.2
planning to achieve them objectives at relevant functions and levels Hasil Pengukuran Pencapaian
2.
ISMS Objectives
7. SUPPORT
The organization shall determine and provide the
resources needed for the establishment,
Struktur Organisasi SGQ & Uraian
7.1 Resources implementation, maintenance and continual Awareness and Communication
Deskipsi Kerja Personil / Pegawai
improvement of the information security
management system.
CHECKLIST IMPLEMENTASI ISO 27001:2013
Dokumentasi
Klausul ISO 27001:2013 Prasyarat Standar ISO 27001:2013 Bukti Pelaksanaan / Records Aktivitas
(Kebijakan/Pedoman/Prosedur)
Dokumentasi
Klausul ISO 27001:2013 Prasyarat Standar ISO 27001:2013 Bukti Pelaksanaan / Records Aktivitas
(Kebijakan/Pedoman/Prosedur)
8. OPERATIONS
Dokumentasi
- Risk and Control Self Assessment Sub
Klausul ISO 27001:2013 Prasyarat Standar ISO 27001:2013 Bukti Pelaksanaan / Records Aktivitas
(Kebijakan/Pedoman/Prosedur)
Policy
- Risk and Control Self Assessment
The organization shall implement the information
8.3 Information Security Risk treatment 1. Risk Treatment Plan (RTP)
security risk treatment plan
9. PERFORMANCE EVALUATION
1. Audit Program
The organization shall conduct internal audits at
2. Audit Plan
9.2 Internal audit planned intervals to provide information on whether Internal Audit
3. Audit Checklist
the information security management system
4. Audit Report
10. IMPROVEMENT
Dokumentasi
Klausul ISO 27001:2013 Prasyarat Standar ISO 27001:2013 Bukti Pelaksanaan / Records Aktivitas
(Kebijakan/Pedoman/Prosedur)
- Top Management
Identifikasi & penetapan isu
- Management
internal & eksternal
Representative
- Top Management
Penetapan lingkup implementasi
- Management
ISMS
Representative
- Top Management
Penetapan & pengesahan Memo
- Management
Struktur Organisasi ISMS di SQG.
Representative
Management
Identifikasi & penetapan SoA Done
Representative
Identifikasi & penetapan Sasaran Management
Done
ISMS Representative
Menyusun Rencana Kerja Management
Done
Implementasi ISMS Representative
Melakukan identifikasi & penilaian
risiko (risk assessment) beserta Risk Officer Done
review
Management
Menetapkan ISMS Objectives Done
Representative
Melakukan pengukuran
ISMS Officer
pencapaian ISMS Objectives
- Management
Melakukan proses analisa
Representative
kebutuhan sumber daya manusia
- SQG Manager
27001:2013
Melakukan penanganan
dokumentasi ISMS sesuai Document Controller cek
ketentuan
Melaksanakan dan
mendokumentasikan proses
ISMS Officer
pengukuran, analisis, dan evaluasi
sesuai ketentuan
Melaksanakan Tinjauan
Manajemen dengan agenda
Management
pembahasan & proses sesuai
Representative
kerangka pada standar &
ketentuan
Management of privileged access The allocation and use of privileged access rights
A.9.2.3
rights; shall be restricted and controlled
A.10 CRYPTOGRAPHY
A.10.1 Cryptographic controls
Securing offices, rooms and Physical security for offices, rooms and facilities shall
A.11.1.3
facilities; be designed and applied
A.11.2 Equipment
Monitoring and review of supplier Organizations shall regularly monitor, review and
A.15.2.1
services; audit supplier service deliver
Changes to the provision of services by suppliers,
including maintaining and improving existing
Managing changes to supplier information security policies, procedures and
A.15.2.2
services controls, shall be managed, taking account of the
criticality of business information, systems and
processes involved and re-assessment of risks
A.17.2 Redundancies
A.18 COMPLIENCE
A.18.1 Compliance with legal and contractual requirements
All relevant legislative statutory, regulatory,
Identification of applicable contractual requirements and the organization’s
A.18.1.1 legislation and contractual approach to meet these requirements shall be
requirements; explicitly identified, documented and kept up to date
for each information system and the organization
Dokumentasi
Bukti Pelaksanaan / Records Aktivitas
(Kebijakan/Pedoman/Prosedur)
1.
Memastikan penerapan kontrol
keamanan informasi telah tercakup
1. Dokumen Kontrak
dalam manajemen proyek
2. NDA
Memastikan pihak-pihak relevan
2.
telah menandatangani NDA
1. Melaksanakan sosialisasi /
1. Bukti pelaksanaan Awareness /
awareness keamanan informasi
Human Resource Security Sosialisasi Keamanan Informasi.
2. Menyusun rencana pelatihan &
2. Rencana Pelatihan Pegawai.
melaksanakan pelatihan pegawai
Asset Management
Memastikan penempatan
perangkat kerja yg aman dari
Physical and Environmental Security potensi risiko gangguan &
ancaman lingkungan serta akses
tdk terotorisasi
1.
Memastikan software yg di-install
di perangkat kerja sesuai dgn
1. Daftar Software yg Diizinkan. Daftar Software yg Diizinkan.
IS Operation and Security
2. Formulir Deviasi 2. Mengajukan permohonan khusus
apabila ada permintaan software di
luar Daftar Software yg Diizinkan.
1. Melaksanakan Vurnelability
Laporan Vurnerability Assessment.
IS Operation and Security Assessment (VA) & Penetration
Laporan Penetration Test.
2. Test secara berkala
1.
Memastikan bahwa klausul terkait
keamanan informasi telah tercakup
pada Kontrak dan/atau SLA
dengan Vendor.
1. Kontrak 2.
Memastikan bahwa vendor dan
Information System Development 2. SLA
pihak-pihak terkait telah
3. NDA
menandatangani NDA.
3.
Memantau dan mengawasi proses
pengembangan agar tetap sesuai
dengan kontrak dan/atau SLA.
Melakukan Pengujian
fungsionalitas keamanan terhadap
Information System Development Laporan Pengujian
sistem informasi yang sedang
dikembangan
1. Tiket Insiden
Mendokumentasikan setiap hasil
Information Security Incident 2. Formulir Ketidaksesuaian
analisa & solusi atas suatu insiden.
3. Review Insiden
Melakukan identifikasi,
1. Tiket Insiden dokumentasi, & penyimpanan
Information Security Incident
2. Formulir Ketidaksesuaian setiap informasi yg dpt menjadi
bukti terkait suatu insiden.
Y MANAGEMENT
- Top Management
- Management
Representative
PJ: Management
Representative
PH: ISMS Officer
- Management
Representative
- ITPS
- Top Management
- Management
Representative
- Top Management
- Management
Representative
ISMS Officer
PJ: Management
Representative
PH: ??
PJ: Management
Representative
PH: ISMS Officer
PJ: Management
Representative
PH: ITPS
PJ: Management
Representative
PH: HC Div
PJ: Management
Representative
PH: HC Div
Management
Representative
ITPS
Management
Representative
Asset Manager
Information Owner
Document Controller
- Information Owner
- Document Controller
Asset Manager
- Asset Manager
- TMS
- ISMS Officer
- Information Owner
IT Sec
IT Sec
- HC Div
- IT Sec
- IT Sec
- Application User
IT Sec
IT Sec
- IT Sec
- ISMS Officer
- Application Owner
IT Sec
All Employee
- ISMS Officer
- IT Security
IT Sec
IT Sec
ITPS
PJ:
ISMS Officer
PH:
Administrator
ITPS
IT Sec
PJ: Management
Representative
PH: ISMS Officer
All Employee
All Employee
All Employee
PJ: ITPS
PH: Document Controller
PJ: Management
Representative
PH: SQG Manager
PJ: Management
Representative
PH: SQG Manager
PJ:
ISMS Officer
PH:
Administrator
PJ: IT Sec
PH: DCM
IT Sec
IT Sec
PJ: IT Sec
PH: DCM
IT Sec
ITPS
ITPS
IT Sec
IT Sec
PJ: IT Sec
PH: DCM
ITPS
PJ:
ISMS Officer
PH:
Tim Development
PJ:
ISMS Officer
PH:
Administrator
IT Security
Administrator
IT Security
IT Policy
Document Controller
ISMS Officer
Tim Development
Administrator
IT Security
ISMS Officer
Tim Development
IT Policy
Document Controller
ISMS Officer
PJ:
ISMS Officer
PH:
Tim Development
PJ:
ISMS Officer
PH:
IT Security
Tim Development
PJ:
ISMS Officer
PH:
Tim Development
PJ:
ISMS Officer
PH:
Tim Development
- Management
Representative
- ITPS
- All Employee
- ISMS Officer
- All Employee
- Vendor / Kontraktor &
pihak terkait lainnya.
- ISMS Officer
- Risk Officer
- ISMS Officer
- Service Desk
- ISMS Officer
- Service Desk
ISMS Officer
ITPS
ITPS
ITPS
Asset Manager
ITPS
ISMS Officer
- ITPS
- Document Controller
ISMS Officer
IT Sec
Management
Representative
- ISMS Officer
- ITPS
ITPS