Information Security Management: ISO/IEC 27001

The ISO/IEC 27001 framework was shot to the limelight in an update in 2013 (replacing the ISO/IEC 27002:2005 model)  by the ISO (International Organization for Standardization) and IEC (International Electrotechnical Commission) and is a possession of the ISO 27000 family of standards. 

ISO27001 is braced up by ISO/IEC 27002:2013, its code of practice for information security management. The ISO/IEC 27002:2013 buttresses the approach utilized in activating information security controls for managing challenges linked to information security. It is the only certifiable information security standard recognized all around the globe.

In essence, large and small businesses around the globe can become ISO/IEC 27000 compliant and protect their company assets.

What is ISO/IEC 27001?

ISO/IEC 27001:2013, alternatively referred to as ISO 27001, is an information security standard recognized internationally, having specifications and a management framework for executing the Information Security Management System (ISMS). While the ISO 2700 family incorporates over a dozen standards, implementing the best practices helps companies manage assets, addressing people, technology, and processes.

Being ISO 2700 compliant help to guarantee corporate data accessibility, confidentiality, and integrity. For example, these data could include information managed by third parties, financial information, employee details, or intellectual property.

An ISMS, Information Security Management System, is an architecture of procedures and policies that includes all technical, physical, and legal controls in an organization’s information risk management processes. The systems’ risk assessments help to uncover potential threats to asset and information security and the weakness in the system that should be timely addressed utilizing provided control features.

With an ISMS adhering wholly to ISO 27001, you’ll be able to manage all corporate data cost-effectively and highly optimized. 

The ISO 27001’s requirement in fulfilling its information security management goals is in six critical parts provided below:

  1. Determine the security policy
  2. Identify the ISMS scope
  3. Perform risk assessment
  4. Handle recognized risks
  5. Choose the control focus and the control features to execute
  6. Design an applicability statement

ISO/IEC 27001 Certification

ISO/IEC 27001 is the certification of an individual to implement ISO 27001 or audit against the ISO 27001 requirements. It may also refer to a company being certified in its information security management system against the ISO 27001 requirements.

Different organizations have their various approach to ISO/IEC 27001. Some only implement the standard to leverage their best practices, while others want to increase their customer’s and clients’ confidence in them by becoming certified. 

But while ISO/IEC 27001 is possible, it is not mandatory, and the ISO doesn’t perform this certification. However, there are several IOS 27001-certified organizations around the world already.

The certification is worth the effort and can serve as a seal of approval for an organization. Some other reasons companies should consider include an increase in revenue, better quality management, enhanced client satisfaction, improved protection of company assets and systems, and improved reputation internationally. The ISO/IEC 27001:2013 additionally discloses how curated corporate data can be kept secure and confidential. This is especially crucial for handling sensitive health or credit card-related information.

Who are the developers?

The creators and developers of the ISO/IEC 27001are the International Organization for Standardization and the International Electrotechnical Commission (ISO/IEC) joint technical committee JTC 1. It was initially established in 2005 and later revised in 2013. 

How do audits work?

Usually, ISO 27001 certification can be acquired once a certification body has performed an external audit on an organization’s procedures, policies, and practices to evaluate the ISMS position to meet the specifications of the standard.

ISO 27001 certification runs for three years; however, organizations must continue implementing an internal audit to improve the process consistently. After being certified, a certification body will monitor the organization’s compliance annually. 

Risk management

Risk management determines an ISMS’s foundation. Conducting risk assessments regularly helps organizations figure out vulnerabilities in the information security system.

Controls & management clauses

The ISO 27001 controls are 114, included in Annex A and expanded on in ISO 27002, offering a model for defining, managing, and addressing information security risks. However, it doesn’t mandate that an organization must implement all of these controls.

A defined risk assessment must determine the needed controls and make clear the need to leave out other controls from the ISMS. Here are the ISO/IEC 27001: 2013 controls highlighted below:

A.5 Information security policies

A.6 Organisation of information security

A.7 Human resources security

A.8 Asset management

A.9 Access control

A.10 Cryptography

A.11 Physical and environmental security

A.12 Operational security

A.13 Communications security

A.14 System acquisition, development, and maintenance

A.15 Supplier relationships

A.16 Information security incident management

A.17 Information security aspects of business continuity management

A.18 Compliance

The management clauses of ISO/IEC 27001:2013 is made of ten clauses that support how an ISMS is implemented, managed, and improved regularly. The ten clauses are Scope, normative references, definitions, the organization’s context, leadership, planning, support, operation, performance evaluation, and improvement.

Tagged:
About the Author

News content on AppleMagazine.com is produced by our editorial team and complements more in-depth editorials which you’ll find as part of our weekly publication. AppleMagazine.com provides a comprehensive daily reading experience, offering a wide view of the consumer technology landscape to ensure you're always in the know. Check back every weekday for more.