Isms - Iso 27001-2022
Isms - Iso 27001-2022
Isms - Iso 27001-2022
Upstream Downstream
Confidentiality of information
Property that information is not made available or disclosed to unauthorized
individuals, entities, or process
Integrity of information
Property of accuracy and completeness
Availability of information
Property of being accessible and usable upon demand by an authorized entity
5
10
Threats Origin
Fire A, D, E
Flood E
Failure of air-conditioning or water supply system A,D
Loss of power supply A, D, E
Theft of media or documents D
Theft of equipment D
Equipment failure A
Unauthorized use of Equipment D
13
1) Structure
2) Procedures/ Processes
3) Resources
Resources
Structure
Procedures/Processes
14
Organization
Chart
Structure
Job
Description
15
Chairman
Assistant
16
Authority
Responsibility
• Responsibility about
certain job or process
17
Procedure:
processes.
Process:
Detailed steps that describe the method of doing a certain task to convert a certain
18
I/Ps
Process Process
Internal Customer
Feed Back
19
Financial Physical
Human Information
Resources
20
• Technical Specifications
• Guidelines
• Definitions
• Others
21
§ It is a non-governmental organization.
§ It is a network of the national standards institutes of 167 countries, one member per
country.
22
23
System (ISMS)
Protection.
25
• Image improvement
1) Scope
2) Normative reference
3) Terms & definitions
4) Context of the organization (Plan)
5) Leadership (Plan)
6) Planning (Plan)
7) Support (Plan)
8) Operation (Do)
9) Performance evaluation (Check)
10) Improvement (Act)
30
4.2 Interested parties 6.2 IS Objectives 7.2 8.2 IS risk 9.2 Internal 10.2 Nonconformity and
Competence corrective action
5.2 Policy and Planning to assessment audit
achieve them
7.4
Communication
7.5
Documented
information
31
32
§ All the requirements of this International Standard are generic and are intended to
be applicable to any organization, regardless of its type or size, or the products and
services it provides.
34
§ For undated references, the latest edition of the referenced document (including any
amendments) applies.
35
For the purposes of this document, the terms and definitions given in ISO 27000
apply
36
Residual risk
Control
Controls may include any process, policy, device, practice, or other actions
which modify / maintain the risk.
Control objective
security.
Risk Management
Availability
Integrity
4.2 Interested parties 6.2 IS Objectives 7.2 8.2 IS risk 9.2 Internal 10.2 Nonconformity and
Competence corrective action
5.2 Policy and Planning to assessment audit
achieve them
7.4
Communication
7.5
Documented
information
42
4.1
The organization shall determine external and internal issues
Understanding context
4.2 that are relevant to its purpose and its strategic direction and
Interested parties
4.3
Scope that affect its ability to achieve the intended result(s) of its
4.4
ISMS
ISMS
ISO/TC 176/SC 2/ N1267
43
The organization shall monitor and review information about these interested parties
ISO/TC 176/SC 2/ N1267
and their relevant requirements that may include legal & other requirements /
contractual obligations
44
45
4.2
Interested parties
continually improve an ISMS including the processes
4.3
Scope needed and their interactions, in accordance with the
4.4
ISMS
requirements of this International Standard.
ISO/TC 176/SC 2/ N1267
46
4.2 Interested parties 6.2 IS Objectives 7.2 8.2 IS risk 9.2 Internal 10.2 Nonconformity and
Competence corrective action
5.2 Policy and Planning to assessment audit
achieve them
7.4
Communication
7.5
Documented
information
47
5.1
5.1 Leadership and commitment
Leadership and commitment
48
5.3
• Be communicated, understood and applied within the
Organizational roles,
responsibilities and authorities
organization;
49
50
4.2 Interested parties 6.2 IS Objectives 7.2 8.2 IS risk 9.2 Internal 10.2 Nonconformity and
Competence corrective action
5.2 Policy and Planning to assessment audit
achieve them
7.4
Communication
7.5
Documented
information
51
addressed
55
6.2
Objectives and planning
56
4.2 Interested parties 6.2 IS Objectives 7.2 8.2 IS risk 9.2 Internal 10.2 Nonconformity and
Competence corrective action
5.2 Policy and Planning to assessment audit
achieve them
7.4
Communication
7.5
Documented
information
57
7.1
7.1 Resources
Resources
7.3
RESOURCES needed for the ISMS.
Awareness
7.4
Communication
7.5
Documented information
ISO/TC 176/SC 2/ N1267
58
competence
59
7.3
c) their contribution to the effectiveness of the ISMS
Awareness d) the implications of not conforming with the ISMS requirements.
7.4
Communication 7.4 Communication
7.5 The organization shall determine the internal and external communications
Documented information
relevant to the ISMS including:
a) on what it will communicate;
b) when to communicate;
c) with whom to communicate;
ISO/TC 176/SC 2/ N1267
d) how to communicate;
60
7.3
The organization’s ISMS shall include:
Awareness
7.5
Standard;
Documented information
b) documented information determined by the organization
as being necessary for the effectiveness of ISMS
ISO/TC 176/SC 2/ N1267
When creating and updating documented information, the organization shall ensure
appropriate
a) identification and description (e.g. a title, date, author, or reference number);
b) format (e.g. language, software version, graphics) and media (e.g. paper,
electronic);
c) review and approval for suitability and adequacy.
ISO/TC 176/SC 2/ N1267
62
63
4.2 Interested parties 6.2 IS Objectives 7.2 8.2 IS risk 9.2 Internal 10.2 Nonconformity and
Competence corrective action
5.2 Policy and Planning to assessment audit
achieve them
7.4
Communication
7.5
Documented
information
64
66
4.2 Interested parties 6.2 IS Objectives 7.2 8.2 IS risk 9.2 Internal 10.2 Nonconformity and
Competence corrective action
5.2 Policy and Planning to assessment audit
achieve them
7.4
Communication
7.5
Documented
information
67
9.1
The organization shall conduct internal audits at planned intervals
Monitoring, measurement,
analysis and evaluation
to provide information on whether the ISMS conforms to:
9.2
Internal audit
1) the organization’s own requirements for its ISMS
9.3
2) the requirements of this International Standard;
Management review
3) is effectively implemented and maintained.
ISO/TC 176/SC 2/ N1267
69
relevant management;
e) take appropriate correction and corrective actions without
undue delay;
f) retain documented information as evidence of the
implementation of the audit program and the audit results.
70
9.1
Top management shall review the organization’s ISMS at planned
Monitoring, measurement,
analysis and evaluation
intervals, to ensure its continuing suitability, adequacy,
9.2
Internal audit effectiveness and alignment with the strategic direction of the
9.3
Management review organization.
ISO/TC 176/SC 2/ N1267
71
72
The outputs of the management review shall include decisions and actions related to:
c) resource needs.
ISO/TC 176/SC 2/ N1267
management reviews.
73
4.2 Interested parties 6.2 IS Objectives 7.2 8.2 IS risk 9.2 Internal 10.2 Nonconformity and
Competence corrective action
5.2 Policy and Planning to assessment audit
achieve them
7.4
Communication
7.5
Documented
information
74
75
Manual
Management
Procedures/plans
Work Instruction
Forms / Records
a) Formulate a risk treatment plan that identifies the appropriate management action,
b) Implement the risk treatment plan in order to achieve the identified control objectives,
To provide management direction and support for information security in accordance with business
requirements and relevant laws and regulations.
Objectives :
2. To maintain the security of the organization’s information and information processing facilities that are
accessed, processed, communicated to, or managed by external parties.
3) Assets Management
Objective:
To ensure that employees, contractors and third party users understand their responsibilities to
reduce the risk.
To ensure that all employees, contractors and third party users are aware of information security
threats and their responsibilities.
To ensure that employees, contractors and third party users exit an organization or change
employment in an orderly manner.
To prevent loss, damage, or theft of assets and interruption to the organization’s activities.
To implement and maintain the appropriate level of information security and service delivery in
line with third party service delivery agreements.
12) Back-up
Objective:
To maintain the integrity and availability of information and information processing facilities.
To ensure the protection of information in networks and the protection of the supporting
infrastructure.
To maintain the security of information and software exchanged within an organization and with any
external entity.
To ensure the security of electronic commerce services, and their secure use.
To ensure a consistent and effective approach is applied to the management of information security
incidents
To avoid breaches of any law, statutory, regulatory or contractual obligations, and of any security
requirements.
20) Compliance with Security Policies and Standards, and Technical Compliance
Objective:
Objective: