Isms Report
Isms Report
Isms Report
RISKS, CONTROLS
Introduction:
This report aims to highlight the objectives, risks, controls, and considerations for information security
within the field of quantity surveying. Information security is crucial in ensuring the confidentiality,
integrity, and availability of sensitive data and information in this profession. By identifying potential
risks and implementing appropriate controls, quantity surveyors can protect their data assets and
maintain the trust of their clients. This report provides insights into the key aspects of information
security in quantity surveying.
i. Data Confidentiality
Objective: Safeguard the confidentiality of sensitive data within the Quantity Survey Section.
Objective: Maintain the integrity of data stored and processed within the Quantity Survey Section.
- Ensure data accuracy and reliability through regular data validation and verification processes.
- Establish backup and recovery procedures to protect against data corruption or loss.
Objective: Establish appropriate access controls to protect sensitive information from unauthorized
access.
- Implement role-based access controls to ensure that employees have access to information based on
their job responsibilities.
- Regularly review and revoke access rights for employees who no longer require them.
iv. Risk Management
Objective: Identify and mitigate information security risks specific to the Quantity Survey Section.
- Develop risk mitigation strategies and controls to minimize the likelihood and impact of security
incidents.
Objective: Promote information security awareness among employees in the Quantity Survey Section.
- Conduct regular security awareness programs to educate employees about information security risks
and best practices.
- Provide training sessions on topics such as password hygiene, data handling procedures, and
recognizing and reporting security incidents.
Objective: Establish an effective incident response plan to address and manage security incidents.
- Develop an incident response plan that outlines roles, responsibilities, and communication channels.
- Conduct periodic drills or simulations to test the effectiveness of the incident response plan.
- Continuously improve the incident response capabilities based on lessons learned from security
incidents.
vii. Compliance
Objective: Ensure compliance with relevant laws, regulations, and industry standards.
- Stay updated with applicable data protection regulations in Kenya and comply with their requirements.
- Use encrypted email and secure file transfer mechanisms when sharing confidential data.
- Implement secure collaboration platforms to protect the confidentiality and integrity of information.
- Establish a clear procedure for incident reporting, including designated contact points.
- Conduct thorough investigations to determine the root causes of security incidents and take
appropriate remedial actions.
x. Continuous Improvement
Objective: Continuously monitor and improve the information security measures within the Quantity
Survey Section.
- Regularly review and update information security policies, procedures, and guidelines.
1. Data Breaches: Unauthorized access to sensitive data, leading to reputational damage, financial
losses, and legal implications.
2. Malware and Cyberattacks: The risk of malicious software, viruses, ransomware, and hacking attempts
that can compromise data and systems.
3. Insider Threats: Potential risks arising from employees or contractors with access to confidential
information who may intentionally or inadvertently cause harm.
4. Data Loss or Corruption: Accidental loss, deletion, or alteration of data due to hardware failures,
software glitches, or natural disasters.
5. Lack of Awareness and Training: Insufficient knowledge among staff regarding information security
best practices, making them susceptible to social engineering attacks.
Controls:
a. Access Controls:
- Regularly review and revoke access privileges for employees and contractors.
- Encrypt sensitive data in transit and at rest to protect against unauthorized access.
- Use firewalls, intrusion detection systems, and antivirus software to detect and prevent malware
attacks.
- Conduct regular security awareness training programs to educate employees about information
security best practices and potential risks.
- Establish clear policies and guidelines for handling sensitive data and ensure employees are aware of
their responsibilities.
d. Incident Response:
- Develop an incident response plan to address and mitigate security incidents promptly.
- Establish a dedicated team to handle security incidents and conduct post-incident analysis to prevent
future occurrences.
e. Physical Security:
- Implement physical security measures, such as access controls, surveillance systems, and secure
storage for physical devices containing sensitive information.
- Implement data integrity checks and audit trails to ensure the accuracy and trustworthiness of
quantity survey information.
- Regularly test and update backup and disaster recovery procedures to maintain data availability.
1. Confidentiality: Implement strong access controls, encryption, and data classification to safeguard
sensitive information from unauthorized disclosure.
2. Integrity: Ensure data accuracy and integrity through regular data validation, error checking, and
version control.
3. Availability: Implement robust backup and disaster recovery solutions to minimize downtime and
ensure business continuity.
Conclusion: