-
1. PLAN AND PREPARE
-
Management support
- Obtain management interest
- Clarify organization’s priorities
- Define security objectives
- Create business case and project plan
- Identify roles and responsibilities
- Get approval from the management
-
2. IDENTIFICATE & ISOLATE
-
Scoping
-
Define organizational scope
- Organizational units: department, service project, subsidiary, etc.
- Organizational structures and responsibilities of managers
- Business Process: Sales management. Procurement process, hiring, etc
-
Define physical scope
- All physical locations, both internal and external, that are included in the ISMS should be considered.
- Identify area (data centre/server rooms/specific area)
- In the case of outsourced physical sites, the interfaces with the ISMS and the applicable service agreements have to be considered.
-
Define technology scope
- Networks: internal networks, wireless networks, etc.
- Operating Systems: Windows, Linux, etc.
- Applications: CRM, software management payroll, ERP. utilities, database
- Data: customer records, medical data, research and development, etc.
- Processes: Consider processes that transport, store or process information.
- Telecommunications equipment: routers, firewalls, etc.
-
Changes in scope
- Evaluated
- Approved
- Documented
-
Create inventory lists
- Identify assets
- Identify asset owner and information classification
-
Create SOA
-
Statement Of Applicability
- Select the relevant controls from the standard
-
Create a document with the objectives/exceptions for the selected controls
- Create a document with the objectives/exceptions for the selected controls
- Defines which controls from ISO/IEC 27001:2013 are selected for implementation
- ISO/IEC 27001:2013 does not specify the form of the SOA
- Good practice: Include the title or function of the responsible person, per control and list of the documents or records relating to it
-
3. EVALUATE
-
Perform gap analysis
-
Conduct external assessments
- technology perimeter assessment
- physical security assessment
-
Conduct internal assessments
- assessment of critical applications
-
Review departmental processes
- interview department head
- interview mid-level employee in the department
- analyse process and practices
-
Risk Management
- Risk Register
-
RTP
- Risk Treatment Plan
- Risk Treatment Plan
-
Risk Assessment Document
-
Perform risk assessment
- Subtopic Create a risk treatment policy
- Define a risk calculation procedure
- Calculate the risk
- Identify controls to mitigate (remove/reduce/transfer) identified risks
-
Risk Assessment Procedure
- Procedure for Risk Calculation
- Risk Management Policy
- Risk Management
- Procedure for Risk Calculation
-
Perform risk assessment
- Subtopic Create a risk treatment policy
- Define a risk calculation procedure
- Calculate the risk
- Identify controls to mitigate (remove/reduce/transfer) identified risks
-
Create Risk Treatment Plan (RTP)
- Create a risk treatment plan
- Obtain management approval
-
4. FIX
-
Create ISMS (Policies, Procedures, Training & Reports)
-
Create security policy
- Change Management Policy
- Obtain management approval
- Incident Handling Policy
- Obtain management objectives
- Wireless Security Policy
- Acceptable Use Policy
- Refer individual policies
- Internet Use Policy
- Email Use Policy
- Mobile Use Policy
- Create the policy
-
Security Policy
- Obtain management objectives
- Create the policy
- Refer individual policies
- Obtain management approval
- Create all referenced individual policies
- Create procedure documents
- Publish the policies
- Conduct awareness training
-
Management review/Internal report
- Subtopic 1Review all documentation
- Review SOA, RTP and policies
- Review controls
- Measure effectiveness
-
5. ASSESS
-
Pre-certification audit
- Conduct a mock audit
- Identify all Non-Conformities(NCs)
- Take relevant actions to close identified NCs
- Identify and contact a certification body for the audit
-
Certification
-
Phase 1
- Document review
- 1 day
- Mandatory
-
Phase 2
- Control review
- Multi-day based on scope
- Mandatory
- 1 day
- Mandatory
- Control review
- Multi-day based on scope
- Mandatory
-
6. REPORT
- Accredited body reports on any non conformities or areas requiring improvement
-
7. MAINTAIN
- Organisation's Security Steering Committee has a post-assessment wash up meeting
- Security Steering Committee schedules regular review meetings
- People with specific duties and responsibilities, schedule their actions for ongoing maintenance
- Consider the use of a suitable Governance, Risk & Compliance platform
- Regularly test the Business Continuity Plan (BCP) and Security Incident Response Plan (SIRP)
- Carry out periodic internal audits
- Carry out periodic due diligence activities on all 3rd parties