International Consultancy Service know about us
ISO/IEC 27001, part of the growing ISO/IEC 27000 family of standards, is an Information Security Management System (ISMS) standard published in October 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Its full name is ISO/IEC 27001:2013 - Information technology -- Security techniques -- Information security management systems -- Requirements but it is commonly known as "ISO 27001".
ISO/IEC 27001 formally specifies a management system that is intended to bring information security under explicit management control. Being a formal specification means that it mandates specific requirements. Organizations that claim to have adopted ISO/IEC 27001 can therefore be formally audited and certified compliant with the standard (more below).
Most organizations have a number of information security controls. Without an ISMS however, the controls tend to be somewhat disorganized and disjointed, having been implemented often as point solutions to specific situations or simply as a matter of convention. Maturity models typically refer to this stage as "ad hoc". The security controls in operation typically address certain aspects of IT or data security, specifically, leaving non-IT information assets (such as paperwork and proprietary knowledge) less well protected on the whole. Business continuity planning and physical security, for examples, may be managed quite independently of IT or information security while Human Resources practices may make little reference to the need to define and assign information security roles and responsibilities throughout the organization.
Systematically examine the organization's information security risks, taking account of the threats, vulnerabilities and impacts;
Design and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment (such as risk avoidance or risk transfer) to address those risks that are deemed unacceptable; and
Adopt an overarching management process to ensure that the information security controls continue to meet the organization's information security needs on an ongoing basis.
se within organizations to formulate security requirements and objectives;
use within organizations as a way to ensure that security risks are cost effectively managed;
use within organizations to ensure compliance with laws and regulations;
use within an organization as a process framework for the implementation and management of controls to ensure that the specific security objectives of an organization are met;
definition of new information security management processes;
identification and clarification of existing information security management processes;
use by the management of organizations to determine the status of information security management activities;
use by the internal and external auditors of organizations to determine the degree of compliance with the policies, directives and standards adopted by an organization;
use by organizations to provide relevant information about information security policies, directives, standards and procedures to trading partners and other organizations with whom they interact for operational or commercial reasons;
implementation of business-enabling information security;
use by organizations to provide relevant information about information security to customers.
The benefits of standardization, and of implementation of one or more of the ISO 27000 series are wide and varied. Although they tend to differ from organization to organization, many are common.
The following is a list of potential benefits. As with many items on this website, this is an ongoing project. Please feel free to add further points via the comments option below.
This is a general benefit of standardization. The idea is that systems from diverse parties are more likely to fit together if they follow a common guideline.
Management can be assured of the quality of a system, business unit, or other entity, if a recognized framework or approach is followed.
Compliance with, or certification against, and international standard is often used by management to demonstrate due diligence.
Organizations often use a standard as a measure of their status within their peer community. It can be used as a bench mark for current position and progress.
Implementation of a standard such as ISO 27001 can often result in greater security awareness within an organization.
Because implementation of ISO 27001 (and the other ISO 27000 standards) tends to involve both business management and technical staff, greater IT and Business alignment often results.
It might seem odd to list this as the first benefit, but it often shows the quickest "return on investment" - if an organization must comply to various regulations regarding data protection, privacy and IT governance (particularly if it is a financial, health or government organization), then ISO 27001 can bring in the methodology which enables to do it in the most efficient way.
In a market which is more and more competitive, it is sometimes very difficult to find something that will differentiate you in the eyes of your customers. ISO 27001 could be indeed a unique selling point, especially if you handle clients' sensitive information.
Lowering the expenses
Information security is usually considered as a cost with no obvious financial gain. However, there is financial gain if you lower your expenses caused by incidents. You probably do have interruption in service, or occasional data leakage, or disgruntled employees. Or disgruntled former employees.
The truth is, there is still no methodology and/or technology to calculate how much money you could save if you prevented such incidents. But it always sounds good if you bring such cases to management's attention.
Putting your business in orde
This one is probably the most underrated - if you are a company which has been growing sharply for the last few years, you might experience problems like - who has to decide what, who is responsible for certain information assets, who has to authorize access to information systems etc.
International Consultancy Service offers a well defined and globally proven implementation methodology for ISO 27001-2013 certification.
Documentation Design and finalization
Internal Auditor Training and conduct of internal audit
Management Review Meeting
Review of Implementation
Stage 1 – certification audit
Stage 2 – certification audit
Award of ISO 27001 certification
Continual improvement of the system through value added consulting and training services
Documentation is an important element of any management system because it clarifies the management processes and activities for users of the system and interested parties. Intention of ISMS is to bring information security under management control in order to ensure that it satisfies and is maintained to continue satisfying the organization’s information protection requirements.
Following are the documents that are mandated by the ISO27001 Standard in order to undergo certification audit.
Sec. 4.3 - Documentation Requirement(s)
Sec. 4.3.1 - General Documentation
Records of Key Management Decisions regarding ISMS - Minutes of Management Meeting, Investment Decisions, Mandating of Policies, Business Expansion Decisions, Reports, etc.
Information Security Policy Set - ISMS Policy, Information Security Policy
Scope of ISMS - ISMS Scope
Procedures and Controls in Support of the ISMS - Information Security Procedures, Controls Documentation
Risk Management Practices in Support of the ISMS - Risk Assessment Methods, Risk Assessment Reports, Risk Treatment Plan
Documented procedures to ensure effective planning, operation and control of its information security process and to measure effectiveness of controls - ISMS Operating Procedures, Information Security Metrics
Records required by ISO27001 - user authorization(s) records, system security logs, change authorization records, etc.
Statement of Applicability - Statement Of Applicability
Sec. 4.3.2 - Control Of Documen
Document Control and Protection Procedures - Document Control Procedure
Sec. 4.3.3 - Control Of Records
Controls needed for identification, storage, protection, retrieval, retention, and disposition of records shall be documented and implemented - Records Control Procedure
Sec. 5.0 - Management Responsibility
Sec. 5.2.2 - Record Maintenance
Records of Education, Training, Skills, Experience and Qualifications - Security Awareness, Training and Education records, Information Security Awareness materials, Training evaluation/ feedback reports, etc.
Sec. 6.0 - Internal ISMS Audits
Documented Internal IS Audit Plans and Procedures, ISMS Audit Reports, Agreed action plans, follow-up/verification/closure reports.
Sec. 7.0 - Management Review of the ISMS
Management review plans and reports
Sec. 8.2 - Corrective Action
Documented corrective action procedure
Sec. 8.3 - Preventive Action
Documented preventive action procedure
Organization of information security
Human resources security
Physical and environmental security
Communications and operations management
Information systems acquisition, development and maintenance
Information security incident management
Business continuity management
As one of the largest ISO 27001 information security management system certification consulting companies across the world with clients in more than 40 countries, our knowledge and experience of the standards is unsurpassed. We understand how to fully exploit the benefits of your information security management system to ensure you unlock the true potential in your organization.
We provide unmatched expertise and technical competence to ensure that your ISO 27001 ISMS certification project adds value to your organization.
We provide consulting, training, internal audits, pre assessment audits and facilitation during ISO 27001 certification audit.
We offer our global knowledge moulded locally to bring in the best results for our clients and partner their journey of standardization, compliance, growth, success and continual improvements.
Contact us now, to get your organization ISO 27001 certified in the most effective and efficient manner while realizing the true benefits of the certification using our specialized ISMS implementation methodology that is less time consuming, fast, easy to understand and implement, result oriented, time bound and cost effective. Get ISO 27001 certified now with us….
We are International Consultancy Service offering ISO certification services across the globe.