Iso 27
Iso 27
Iso 27
Slide 1
19h00
19h45: 20h00
Information Security ISO 27001: 2005 and ISO 27002:2005 Control objectives and controls Deffrinces between ISO 27001 & other Standards ITIL, Cobit, ISO 20000
Slide 2
Slide 3
Scenario
Compliance requirements, new notification laws and the growing of
breaches have made organizations aware they need a structured approach to data security.
Organizations are increasingly dependent on information assets Information users (internal & external) are demanding increased
availability growing
The number of incidents that threaten the continuity of operations is A single security breach can:
destroy a companys Image depress the value of the business erode the bottom line; and compromise future earnings
Slide 4
Study: US Cost of Data Breach- research conducted by Ponemon Institute LLC). Dollars per breach and ranged between 225.000 to almost 35 million
Slide 5
most significant source of a data breach. (2007 Annual Study: US Cost of Data Breach- research conducted by Ponemon Institute LLC)
Slide 6
Non-Compliance
Restrictions on business activities Loss of a contract New privacy controls Publicly named through a Commissioners order or legal proceedings
Customer Complaint
Over-Compliance
Slide 7
Information as an Asset
Information is:
An asset that, like other important business assets, is essential to an organizations business and consequently needs to be suitably protected.
Source: ISO/IEC 27002:2005 Section 0.1
Asset Definition:
Slide 8
Paper document (on desks, in waste bins, left on photocopiers) Whiteboards conversations overheard Conversations on public transports People
Slide 9
Information Security
Information Security
preservation of confidentiality, integrity and availability of information; in addition, other properties, such as authenticity, accountability, non-repudiation, and reliability can also be involved
Source: ISO/IEC 27001:2005
Confidentiality: Ensuring that information is accessible only to those
Slide 10
That part of the overall management system, based on a business risk approach, to establish, implement, operate, monitor, review, maintain and improve information security Is a Management Process and Not a technological process Strategic decision of an organization Design and implementation
Needs and objectives Security requirements Processes employed Size and structure of the organization
Slide 11
Slide 12
The Department of Trade and Industry (DTI), which is part of the UK Government, publish a 'Code of Practice for Information Security Management'. This document is amended and re-published by the British Standards Institute (BSI) in 1995 as BS7799.
1999
The first major revision of BS7799 was published. This included many major enhancements. Accreditation and certification schemes are launched. LRQA and BSI are the first certification bodies.
2000
In December, BS7799 is again re-published, this time as a fast tracked ISO standard. It becomes ISO 17799 (or more formally, ISO/IEC 17799).
Slide 13
Slide 14
ISO 27001
There are two closely related standards:
ISO/IEC 27001 is a standard specification for requirements of an Information Security Management Systems (ISMS). ISO/IEC 27002:2005 is the standard code of practice and can be regarded as a comprehensive catalogue of good security things to do.
ISO/IEC 27001 Specifies requirements:
For establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented ISMS
Designed to:
Ensure adequate security controls to protect information assets, documenting ISMS Give confidence to customers & interested parties
Slide 15
Helps organizations determine their security maturity relative to a set of capability metrics
Under development
ISO/IEC 27000 - an introduction and overview for the ISMS Family of Standards, plus a glossary of common terms ISO/IEC 27003 - ISMS implementation guide ISO/IEC 27004 - information security management measurements ISO/IEC 27005 - information security risk management ISO/IEC 27007 - guideline for auditing ISMSs ISO/IEC 27011 - guideline for ISMSs in the telecommunications industry ISO/IEC 27799 - guidance on implementing ISO/IEC 27002 in the healthcare industry
Slide 16
Process Approach
ISO 27001 has adopted a Process Approach, which means an organization Any activity using resources and managed in order to enable the
Process approach for ISMS encourages users to emphasize the importance of:
understanding an organizations information security requirements and the need to establish POLICY and OBJECTIVES for information security implementing and operating CONTROLS to manage an organizations information security risks in the context of the organizations overall business risks monitoring and reviewing the performance and effectiveness of the ISMS, and CONTINUAL IMPROVEMENT based on objective measurement
Slide 17
PDCA
Plan, Do, Check, Act is to be applied to structure all ISMS processes Figure illustrates how an ISMS takes the information security
requirements and expectations of the interested parties and, through the necessary actions and processes, produces information security outcomes that meets those requirements and expectations
Slide 18
PDCA
The continuous change of the company, technology and society
requires a process of continuously evaluating the effectiveness and efficiency of all security controls and adopting the security system to changing requirements.
Plan and implement security controls Operate security controls Monitor the security system and the world around you Initiate necessary change of the security system
Slide 19
to support consistent and integrated implementation and operation with related management standards.
Slide 20
Risk treatment plan based on risk assessment Documentation supporting various clauses Statement of applicability based on scoping, justifying the choice of controls Annex A lists mandatory controls to choose from Valid justification must be documented to eliminate a control Chosen controls must be documented for audit purposes
Slide 21
Step 2
Scope of ISMS
Step 3
Step 4
Step 5
Statement of Applicability
Slide 22
Scope and boundaries Policy / objectives Define risk assessment approach Identify risks Analyse and evaluate the risks Identify and evaluate options for treatment of risks Select control objectives & controls (Annex A) Obtain management approval of the proposed residual risks Obtain management authorisation to implement and operate the ISMS Prepare a Statement of Applicability
Slide 23
Implementation of an ISMS - Do
Implement and operate the ISMS
Formulate risk treatment plan Implement risk treatment plan Define how to measure effectiveness of selected controls Implement controls selected to meet control objectives Implement training and awareness Manage operations and resources Implement procedures and other controls
Slide 24
Execute monitoring procedures and other controls Undertake regular reviews of the effectiveness of the ISMS Measure effectiveness of controls Review risk assessments at planned intervals Review level of residual risk and identified acceptable risk Internal ISMS audits / Management review Update security plans Record actions and events
Slide 25
Implement identified improvements Take appropriate corrective and preventive actions Communicate the actions and improvements Ensure improvements achieve intended objectives
Slide 26
Slide 27
The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards. Even then, I wouldnt stake my life on it. Gene Spafford Director, Computer Operations, audit, and Security Technology (COAST - Computer Operations, Audit and Security Technology) Purdue University
Slide 28
program suitable to the needs of business and industry confidentiality of corporate information assets maintains within the organization.
Protection in 27002 is based on assuring integrity, availability, and Assurance is attained through controls that management creates and Ten of the controls are considered "Key Controls" because they are
Slide 29
Slide 30
Selection of Controls
Additional control objectives and controls:
Organization might consider that additional control objectives and controls are necessary
Consider local environmental or technological constraints In a form that suits every potential user in an organization
Slide 31
Choice of controls Controls considered to be essential to an organization from a legislative point of view include:
intellectual property rights (see 15.1.2) safeguarding of organizational records (see 15.1.3) data protection and privacy of personal information (see 15.1.4).
Controls considered to be common best practice for information
security include:
information security policy document (see 5.1.1) allocation of information security responsibilities (see 6.1.3) information security education and training (see 8.2.2) reporting information security events (see 13.1.1) Information security aspects of business continuity management (see 14.1)
Slide 32
Slide 33
Definitions
COBIT Cobit stands for Control Objective over Information and Related Technology. Cobit issued by ISACA (Information System Control Standard) a non profit organization for IT Governance. The Cobit main function is to help the company, mapping their IT process to ISACA best practices standard. Cobit usually choosen by the company who performing information system audit, whether related to financial audit or general IT audit. ITIL ITIL stands for Information Technology Library. ITIL issued by OGC, is a set of framework for managing IT Service Level. Although ITIL is quite similar with COBIT in many ways, but the basic difference is Cobit set the standard by seeing the process based and risk, and in the other hand ITIL set the standard from basic IT service.
Slide 34
Comparison
ISO27001 ISO27001 is much more different between COBIT and ITIL, because ISO27001 is a security standard, so it has smaller but deeper domain compare to COBIT and ITIL. Here is the detail table of comparison between this three standard
AREA Function COBIT Mapping IT Process 4 Process and 34 Domain ISACA Information System Audit Accounting Firm, IT Consulting Firm ITIL ISO27001
Mapping IT Information Service Level Security Management Framework 9 Process OGC 10 Domain ISO Board
Compliance Manage to security Service Level standard IT Consulting firm, Security Firm, Network Consultant
Consultant
IT Consulting firm
Slide 35
Slide 36
Q&A
Slide 37
Mahmood.Justanieah@bureauveritas.com
Slide 38