Vous êtes sur la page 1sur 8

Basic Introduction to ISO27001:

Scope, Implementation & Application

Created By Imran Ahmed (ImranahmedIT)


www.imran-ahmed.co.uk
Introduction
 ISO 27001 is the international standard describing best practice for an Information
Security Management System (ISMS).

 An ISMS is a framework of policies and procedures that includes all legal, physical
and technical controls involved in an organisation's information risk management
processes.

 Being ISO 27001 approved is a certification which shows that the business has
defined and implemented effective Information security processes.
Created by Imran Ahmed (ImranahmedIT) www.imran-ahmed.co.uk
Benefits of ISO27001 – Table (1)
Information Security Issue How ISO 27001 helps Benefits
With increasing fines for personal It provides a framework for the • Supports compliance with relevant laws and
data breaches, organizations need management of information security regulations
1 to ensure compliance with risks, which ensures you take into • Reduces likelihood of facing prosecution and
legislative requirements, such as account your legal and regulatory fines
the UK Data Protection Act requirements • Can help you gain status as a preferred supplier
It requires you to identify risks to • Protects your reputation
Potential information breach, your information and put in place • Provides reassurance to clients that their
2 damaging your reputation security measures to manage or information is secure
reduce them • Cost savings through reduction in incidents

It ensures that authorised users have • Demonstrates credibility and trust


Availability of vital information at
3 all times
secure access to information when • Improves your ability to recover your
they need it operations and continue business as usual

Created by Imran Ahmed (ImranahmedIT) www.imran-ahmed.co.uk


Benefits of ISO27001 – Table (2)
Information Security Issue How ISO 27001 helps Benefits
Gives you a framework for identifying • Confidence in your information security
Lack of confidence in your
risks to information security and arrangements
4 organizations ability to manage
implementing appropriate • Better visibility of risks amongst interested
information security risks
management and technical controls stakeholders
It provides a way of ensuring that a • Meet customer and tender requirements
Difficulty in responding to rising
common set of policies, procedures • Reduce third party scrutiny of your information
5 customer expectations in relation
and controls are in place to manage security requirements
to the security of their information
risks to information security • Get a competitive advantage
It ensures senior management
• Improved information security awareness
recognize information security as a
No awareness of information • Shows commitment to information security at
6 security within your organization
priority and that there is clear level of
all levels throughout your organization
knowledge from the top level all the
• Reduces staff-related security breaches
way down
Created by Imran Ahmed (ImranahmedIT) www.imran-ahmed.co.uk
ISO 27001
ISO 27001 uses a top down, risk-based approach and is technology-
neutral. The specification defines a six-part planning process:

 Define a security policy.


 Define the scope of the ISMS.
 Conduct a risk assessment.
 Manage identified risks.
 Select control objectives and controls to be implemented.
 Prepare a statement of applicability. Created by Imran Ahmed (ImranahmedIT) www.imran-ahmed.co.uk
ISO 27002
This standard describes a comprehensive set of information security control objectives and a set of generally
accepted good practice security controls.
ISO 27002 contains 12 main sections:
1. Risk assessment 7. Communications and operations management
2. Security policy 8. Access control
3. Organization of information security 9. Information systems acquisition, development
4. Asset management and maintenance

5. Human resources security 10. Information security incident management

6. Physical and environmental security 11. Business continuity management


12. Compliance
Created by Imran Ahmed (ImranahmedIT) www.imran-ahmed.co.uk
ISO 27000 Family
Other standards that have also been developed in the 27000 family are:
 27003 – implementation guidance.

 27004 - an information security management measurement standard suggesting metrics to


help improve the effectiveness of an ISMS.

 27005 – an information security risk management standard. (Published in 2008)

 27006 - a guide to the certification or registration process for accredited ISMS certification
or registration bodies. (Published in 2007)

 27007 – ISMS auditing guideline. Created by Imran Ahmed (ImranahmedIT) www.imran-ahmed.co.uk


Thanks for reading!

Other standards that have also been developed in the 27000 family are:
 If you like to contact me, feel free to head over to my website: www.imran-ahmed.co.uk

 You can also see my other SlideShare presentations

 Alternatively, visit my Blog page

Created by Imran Ahmed (ImranahmedIT) www.imran-ahmed.co.uk

Vous aimerez peut-être aussi