HOME LAB : HANDS-ON
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
ISO/IEC
27002 control identifier |
Control
name |
Control
type |
Information
security properties |
Cybersecurity
concepts |
Operational
capabilities |
Security
domains |
5.1 |
Policies for
information security |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify |
#Governance |
#Governance_
and_Ecosys- tem #Resil- ience |
5.2 |
Information
security roles and responsi- bilities |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify |
#Governance |
#Govern-
ance_and_ Ecosystem#Protection#Resilience |
5.3 |
Segregation
ofduties |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Governance
#Identity_and_access_man-agement |
#Governance_
and_Ecosys- tem |
5.4 |
Management
responsibili- ties |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify |
#Governance |
#Governance_
and_Ecosys- tem |
5.5 |
Contact with
authorities |
#Preventive
#Corrective |
#Confidentiality
#Integrity #Availability |
#Identify
#Protect #Respond #Recover |
#Governance |
#Defence
#Re- silience |
5.6 |
Contact with
special inter- est groups |
#Preventive
#Corrective |
#Confidentiality
#Integrity #Availability |
#Protect#Respond
#Recover |
#Governance |
#Defence |
5.7 |
Threat
intelli- gence |
#Preventive
#Detective #Corrective |
#Confidentiality
#Integrity #Availability |
#Identify
#Detect #Respond |
#Threat_and_
vulnerability_ management |
#Defence
#Re- silience |
5.8 |
Information
security in project man- agement |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify
#Protect |
#Governance |
#Governance_
and_Ecosys- tem #Protec- tion |
5.9 |
Inventory of
information and other associated assets |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify |
#Asset_man-agement |
#Governance_
and_Ecosys- tem #Protec- tion |
5.10 |
Acceptable
use of information and other associated assets |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Asset_man-agement#Information_protection |
#Governance_
and_Ecosys- tem #Protec- tion |
5.11 |
Return
ofassets |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Asset_man-agement |
#Protection |
5.12 |
Classification
of information |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify |
#Information_protection |
#Protection#Defence |
5.13 |
Labelling of
information |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Information_protection |
#Defence#Protection |
5.14 |
Information
transfer |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Asset_man-agement#Information_protection |
#Protection |
5.15 |
Access
control |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Identity_and_
access_man- agement |
#Protection |
5.16 |
Identity
man-agement |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Identity_and_
access_man- agement |
#Protection |
5.17 |
Authentication
information |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Identity_and_
access_man- agement |
#Protection |
5.18 |
Access
rights |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Identity_and_
access_man- agement |
#Protection |
5.19 |
Information
security in supplier rela- tionships |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify |
#Supplier_re-
lationships_se- curity |
#Governance_
and_Ecosys- tem #Protec- tion |
5.20 |
Addressing
information security with- in supplier agreements |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify |
#Supplier_re-
lationships_se- curity |
#Governance_
and_Ecosys- tem #Protec- tion |
5.21 |
Managing
information security inthe ICT supply chain |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify |
#Supplier_re-
lationships_se- curity |
#Governance_
and_Ecosys- tem #Protec- tion |
5.22 |
Monitor-
ing, review and change management of supplier services |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify |
#Supplier_re-
lationships_se- curity |
#Governance_
and_Ecosys- tem #Protec- tion #Defence#Information_ security_as- surance |
5.23 |
Information
security for use of cloud services |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Supplier_re-
lationships_se- curity |
#Governance_
and_Ecosys- tem #Protec- tion |
5.24 |
Information
security inci- dent manage- ment planning and prepara- tion |
#Corrective |
#Confidentiality
#Integrity #Availability |
#Respond
#Recover |
#Governance#Informa-tion_securi-ty_event_man-agement |
#Defence |
5.25 |
Assessment
and decision on informa- tion security events |
#Detective |
#Confidentiality
#Integrity #Availability |
#Detect
#Respond |
#Informa-
tion_securi- ty_event_man- agement |
#Defence |
5.26 |
Response to
information security inci- dents |
#Corrective |
#Confidentiality
#Integrity #Availability |
#Respond
#Recover |
#Informa-
tion_securi- ty_event_man- agement |
#Defence |
5.27 |
Learning
from information security inci- dents |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify
#Protect |
#Informa-
tion_securi- ty_event_man- agement |
#Defence |
5.28 |
Collection
of evidence |
#Corrective |
#Confidentiality
#Integrity #Availability |
#Detect
#Respond |
#Informa-
tion_securi- ty_event_man- agement |
#Defence |
5.29 |
Information
security dur- ing disruption |
#Preventive
#Corrective |
#Confidentiality
#Integrity #Availability |
#Protect
#Respond |
#Continuity |
#Protection#Resilience |
5.30 |
ICT
readiness for business continuity |
#Corrective |
#Availability |
#Respond |
#Continuity |
#Resilience |
5.31 |
Legal,
statuto- ry, regulatory and contrac- tual require- ments |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify |
#Legal_and_compliance |
#Governance_
and_Ecosys- tem #Protec- tion |
5.32 |
Intellectual
property rights |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify |
#Legal_and_compliance |
#Governance_
and_Ecosys- tem |
5.33 |
Protection
ofrecords |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify
#Protect |
#Legal_and_compliance#Asset_man-agement#Information_protection |
#Defence |
5.34 |
Privacy and
protection of PII |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify
#Protect |
#Information_protection#Legal_and_compliance |
#Protection |
5.35 |
Independent
review of information security |
#Preventive
#Corrective |
#Confidentiality
#Integrity #Availability |
#Identify
#Protect |
#Information_
security_as- surance |
#Governance_
and_Ecosys- tem |
5.36 |
Compliance
with policies, rules and standards for information security |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify
#Protect |
#Legal_and_compliance#Information_security_as-surance |
#Governance_
and_Ecosys- tem |
5.37 |
Documented
operating procedures |
#Preventive
#Corrective |
#Confidentiality
#Integrity #Availability |
#Protect
#Recover |
#Asset_man-agement#Physi-cal_security#System_and_network_secu-rity
#Applica-tion_security#Secure_con-figuration#Identity_and_access_management#Threat_and_vulnerability_management#Continuity#Informa-tion_securi-ty_event_man-agement |
#Governance_
and_Ecosys- tem #Protec- tion #Defence |
6.1 |
Screening |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Human_re-
source_secu- rity |
#Governance_
and_Ecosys- tem |
6.2 |
Terms and
conditions of employment |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Human_re-
source_secu- rity |
#Governance_
and_Ecosys- tem |
6.3 |
Information
security awareness, education and training |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Human_re-
source_secu- rity |
#Governance_
and_Ecosys- tem |
6.4 |
Disciplinaryprocess |
#Preventive
#Corrective |
#Confidentiality
#Integrity #Availability |
#Protect
#Respond |
#Human_re-
source_secu- rity |
#Governance_
and_Ecosys- tem |
6.5 |
Responsi-
bilities after termination or change of employment |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Human_re-
source_secu- rity #Asset_ management |
#Governance_
and_Ecosys- tem |
6.6 |
Confiden-tiality
ornon-disclosureagreements |
#Preventive |
#Confidenti-ality |
#Protect |
#Human_re-
source_secu- rity #Infor- mation_pro- tection#Supplier_re-lationships |
#Governance_
and_Ecosys- tem |
6.7 |
Remote work-
ing |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Asset_man-agement#Information_protection#Physical_se-curity
#Sys-tem_and_net-work_security |
#Protection |
6.8 |
Information
security event reporting |
#Detective |
#Confidentiality
#Integrity #Availability |
#Detect |
#Informa-
tion_securi- ty_event_man- agement |
#Defence |
7.1 |
Physical
secu- rity perime- ters |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Physical_se-curity |
#Protection |
7.2 |
Physical
entry |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Physical_se-
curity #Iden- tity_and_Ac- cess_Manage- ment |
#Protection |
7.3 |
Securing
offic- es, rooms and facilities |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Physical_se-
curity #Asset_ management |
#Protection |
7.4 |
Physical
secu- rity monitor- ing |
#Preventive
#Detective |
#Confidentiality
#Integrity #Availability |
#Protect
#Detect |
#Physical_se-curity |
#Protection#Defence |
7.5 |
Protect-ing
againstphysical andenvironmentalthreats |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Physical_se-curity |
#Protection |
7.6 |
Working
insecure areas |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Physical_se-curity |
#Protection |
7.7 |
Clear desk
and clear screen |
#Preventive |
#Confidenti-ality |
#Protect |
#Physical_se-curity |
#Protection |
7.8 |
Equipment
siting and protection |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Physical_se-
curity #Asset_ management |
#Protection |
7.9 |
Security of
as- sets off-prem- ises |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Physical_se-
curity #Asset_ management |
#Protection |
7.10 |
Storage
media |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Physical_se-
curity #Asset_ management |
#Protection |
7.11 |
Supporting
utilities |
#Preventive
#Detective |
#Integrity
#Availability |
#Protect
#Detect |
#Physical_se-curity |
#Protection |
7.12 |
Cabling
secu-rity |
#Preventive |
#Confidentiality
#Availability |
#Protect |
#Physical_se-curity |
#Protection |
7.13 |
Equipment
maintenance |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Physical_se-
curity #Asset_ management |
#Protection#Resilience |
7.14 |
Secure
dispos- al or re-use of equipment |
#Preventive |
#Confidenti-ality |
#Protect |
#Physical_se-
curity #Asset_ management |
#Protection |
8.1 |
User
endpoint devices |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Asset_man-agement#Information_protection |
#Protection |
8.2 |
Privileged
access rights |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Identity_and_
access_man- agement |
#Protection |
8.3 |
Information
access restric- tion |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Identity_and_
access_man- agement |
#Protection |
8.4 |
Access to
source code |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Identity_
and_access_ management#Applica-tion_security#Secure_con-figuration |
#Protection |
8.5 |
Secure
authen-tication |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Identity_and_
access_man- agement |
#Protection |
8.6 |
Capacity
man-agement |
#Preventive
#Detective |
#Integrity
#Availability |
#Identify
#Protect #Detect |
#Continuity |
#Governance_
and_Ecosys- tem #Protec- tion |
8.7 |
Protection
against mal- ware |
#Preventive
#Detective #Corrective |
#Confidentiality
#Integrity #Availability |
#Protect
#Detect |
#System_and_
network_secu- rity #Informa- tion_protec- tion |
#Protection#Defence |
8.8 |
Management
of technical vulnerabilities |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify
#Protect |
#Threat_and_
vulnerability_ management |
#Governance_
and_Ecosys- tem #Protec- tion #Defence |
8.9 |
Configuration
management |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Secure_con-figuration |
#Protection |
8.10 |
Informationdeletion |
#Preventive |
#Confidenti-ality |
#Protect |
#Information_protection#Legal_and_compliance |
#Protection |
8.11 |
Data masking |
#Preventive |
#Confidenti-ality |
#Protect |
#Information_protection |
#Protection |
8.12 |
Data
leakageprevention |
#Preventive
#Detective |
#Confidenti-ality |
#Protect
#Detect |
#Information_protection |
#Protection#Defence |
8.13 |
Information
backup |
#Corrective |
#Integrity
#Availability |
#Recover |
#Continuity |
#Protection |
8.14 |
Redundancyof
informationprocessingfacilities |
#Preventive |
#Availability |
#Protect |
#Continuity#Asset_man-agement |
#Protection#Resilience |
8.15 |
Logging |
#Detective |
#Confidentiality
#Integrity #Availability |
#Detect |
#Informa-
tion_securi- ty_event_man- agement |
#Protection#Defence |
8.16 |
Monitoring
activities |
#Detective
#Corrective |
#Confidentiality
#Integrity #Availability |
#Detect
#Respond |
#Informa-
tion_securi- ty_event_man- agement |
#Defence |
8.17 |
Clock
synchro-nization |
#Detective |
#Integrity |
#Protect
#Detect |
#Informa-
tion_securi- ty_event_man- agement |
#Protection#Defence |
8.18 |
Use of
privi- leged utility programs |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#System_and_
network_secu- rity #Secure_ configuration#Application_security |
#Protection |
8.19 |
Installation
of software on operational systems |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Secure_con-figuration#Application_security |
#Protection |
8.20 |
Networkssecurity |
#Preventive
#Detective |
#Confidentiality
#Integrity #Availability |
#Protect
#Detect |
#System_and_
network_secu- rity |
#Protection |
8.21 |
Security of
network ser- vices |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#System_and_
network_secu- rity |
#Protection |
8.22 |
Segregation
ofnetworks |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#System_and_
network_secu- rity |
#Protection |
8.23 |
Web
filtering |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#System_and_
network_secu- rity |
#Protection |
8.24 |
Use of
cryp-tography |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Secure_con-figuration |
#Protection |
8.25 |
Secure
devel- opment life cycle |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Applica-tion_security#System_and_network_secu-rity |
#Protection |
8.26 |
Application
security re- quirements |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Applica-tion_security#System_and_network_secu-rity |
#Protection#Defence |
8.27 |
Secure
system architecture and engineer- ing principles |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Applica-tion_security#System_and_network_secu-rity |
#Protection |
8.28 |
Secure
coding |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Applica-tion_security#System_and_network_secu-rity |
#Protection |
8.29 |
Security
testing in de- velopment and acceptance |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Identify |
#Applica-tion_security#Informa-tion_securi-ty_assurance#System_and_network_secu-rity |
#Protection |
8.30 |
Outsourced
development |
#Preventive
#Detective |
#Confidentiality
#Integrity #Availability |
#Identify
#Protect #Detect |
#System_and_
network_secu- rity #Applica- tion_security#Supplier_re- lationships_se-
curity |
#Governance_
and_Ecosys- tem #Protec- tion |
8.31 |
Separation
of develop- ment, test and production environments |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Applica-tion_security#System_and_network_secu-rity |
#Protection |
8.32 |
Change
man-agement |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#Applica-tion_security#System_and_network_secu-rity |
#Protection |
8.33 |
Test
informa- tion |
#Preventive |
#Confidentiality
#Integrity |
#Protect |
#Information_protection |
#Protection |
8.34 |
Protection
of informa- tion systems during audit testing |
#Preventive |
#Confidentiality
#Integrity #Availability |
#Protect |
#System_and_
network_secu- rity #Informa- tion_protec- tion |
#Governance_
and_Ecosys- tem #Protec- tion |
Category |
Related Controls |
Description |
1. Information Security Governance and Policies |
5.01, 5.02, 5.03, 5.04, 5.35, 5.36 |
Policies, roles, and responsibilities for maintaining
information security. Governance and compliance reviews. |
2. Information Asset Management |
5.09, 5.10, 5.11, 5.12, 5.13, 8.10, 8.11, 5.33 |
Managing information assets, asset inventory,
classification, and labelling. Asset disposal and protection
of records. |
3. Access Control and Identity Management |
5.15, 5.16, 5.17, 5.18, 8.02, 8.03, 8.05 |
Managing access rights, identity verification, and secure
authentication. Controlling access to sensitive
information. |
4. Supplier and External Party Management |
5.19, 5.20, 5.21, 5.22, 8.30 |
Ensuring information security in relationships with
suppliers and service providers. Managing risks in the
supply chain. |
5. Incident Management and Response |
5.24, 5.25, 5.26, 5.27, 5.28, 6.08 |
Incident response planning, handling security incidents,
learning from them, and managing evidence collection. |
6. Business Continuity and Resilience |
5.29, 5.30, 8.13, 8.14 |
Ensuring business continuity during disruptions. Backup and
redundancy of information processing. |
7. Compliance and Legal Obligations |
5.31, 5.32, 5.34 |
Compliance with legal, regulatory, and contractual
requirements. Protection of personal and intellectual
property information. |
8. Physical and Environmental Security |
7.01, 7.02, 7.03, 7.04, 7.05, 7.06, 7.07, 7.08, 7.09, 7.10,
7.11, 7.12, 7.13, 7.14 |
Securing the physical environment, facilities, equipment,
and utility support. Protection from physical and
environmental threats. |
9. User and Employment Security |
6.01, 6.02, 6.03, 6.04, 6.05, 6.06, 6.07 |
Ensuring employee-related information security, including
screening, training, and responsibilities during and after
employment. |
10. System and Network Security |
8.07, 8.08, 8.09, 8.06, 8.18, 8.19, 8.20, 8.21, 8.22,
8.23 |
Securing systems, networks, and applications from malware,
vulnerabilities, and other threats. Network segregation,
configuration, and software installation controls. |
11. Logging and Monitoring |
8.15, 8.16, 8.17 |
Monitoring and logging activities, including clock
synchronization to ensure accurate logs. |
12. Cryptography and Data Protection |
8.24, 8.12 |
Encryption and cryptography use, as well as protection
against data leakage. |
13. Secure Development and Testing |
8.04, 8.25, 8.26, 8.27, 8.28, 8.29, 8.31, 8.33 |
Security in development, testing, and coding. Separation of
environments and secure application lifecycle
management. |
14. Change and Audit Management |
8.32, 8.34 |
Change management and protecting systems during audits.
Ensuring smooth transitions and minimal risk during
audits. |
15. Threat Intelligence and External Relations |
5.07, 5.05, 5.06 |
Monitoring and addressing external threats, including
contacts with authorities and interest groups. |
16. Cloud Security |
5.23 |
Managing security related to the use of cloud services. |
Training will be 4 days and what will take away from this Training.
Two words on Knowledge and Skill.
Learning Objectives
Three pillars: Confidentiality, Integrity and Availability [CIA]
Means cannot be challenged by anybody.
Means unaltered information. Information cannot be changed in-between end to end.
Also need to secure the in-between facility which is processing the information.
How the information should be discarded.
Reduce Security incidents, increase staff retention, Protection of brand and reputation, reduce costs of correction, customer retention, etc
Why is Information security management important within the organization?
Stats:
What Needs to be managed in a Information Security Management system?
As an ISMS manager: just telling them to follow. Do not be a SME in Statutory field to implement ISMS. Show what are the list of Statutory and regulatory requirements you are adhered to.
working under other organization: - Policies, regulation, contractual terms will be passed on to the vendor organization also.
Top management should create and provide resources,
Create security Policy, security objectives
Directions:
As directed by your tutor, consider clause 5 and in particular sub-clause 5.1 and identify
which leadership/commitment behaviours and competencies, with respect to information
security management, you would expect from the organization provided
****************************************************************
Notes:
Top management will provide the support.
Clause 8 is also the DO part from PDCA
8.1 Operational planning and control
8.2 Information security risk assessment
8.3 Information security risk treatment
Problem Statement:
Internal Issues:
Directions, Part 1:
Points Discussed:
9.1 Monitoring, measurement, analysis and evaluation
9.2 Internal audit
9.3 Management review
10.1 Nonconformity and corrective action
10.2 Continual improvement
Read the standards 27001 and 27002
Remaining activities to be completed
Annexure A has to be read.
A.5 Information security policies
A.5.1 Management direction for information security
A.5.1.1 Policies for information security
A.5.1.2 Review of the policies for information security
A.6 Organization of information security
A.6.1 Internal organization
A.6.1.1 Information security roles and responsibilities
A.6.1.2 Segregation of duties
A.6.1.3 Contact with authorities
A.6.1.4 Contact with special interest groups
A.6.1.5 Information security in project management
A.6.2 Mobile devices and teleworking
A.6.2.1 Mobile device policy
A.6.2.2 Teleworking
A.7 Human resource security
A.7.1 Prior to employment
A.7.1.1 Screening
A.7.1.2 Terms and conditions of employment
A.7.2 During employment
A.7.2.1 Management responsibilities
A.7.2.2 Information security awareness, education and training
A.7.2.3 Disciplinary process
A.7.3 Termination and change of employment
A.7.3.1 Termination or change of employment responsibilities
A.8 Asset management
A.8.1 Responsibility for assets
A.8.1.1 Inventory of assets
A.8.1.2 Ownership of assets
A.8.1.3 Acceptable use of assets
A.8.1.4 Return of assets
A.8.2 Information classification
A.8.2.1 Classification of information
*******************************************************************************
Process: is the key for the organization to last for centuries
Plan : requirements: - Clause 4 Context of the org. / 5 leadership / 6 Planning / 7 Support
DO : implement: - Clause 8 Operation
Check : Audits/ gaps/ managements review: - Clause 9 Performance evaluation
Act : Results/ improvement: - Clause 10 Improvement
Required documented information
Control of documentation information
Exercises Activity 18: home work
Activity 19: Create Gantt Chart
Create a Excel and do the Gantt chart
Define the scope: Decide of the organization
Call Centre: 50 to 100 people will be working, for Airtel, dealing with customers of the Airtel
Telecom Company: SIM CARD
Department:
It Network Department, HR Department, Telecom regulatory, Physical Scope, Centre situated, Staff,
Core Business activities:
In bound: answering the question from the custom
Call centre 24/7
Scope:
Type of activities: InboundWill show the intention of the organization and will be the driving force.
Roles, Responsibility and authorities: for an ISMS Manager
CIA on information assets
Risk criteria 🡪 Risk acceptance Criteria/ Criteria for performing
Asset Register
Cause
Sources
Statement of applicability
Activity 26 / 27 / 28 / 29: home work
****************************************************************
Documentation must be revisited every year, why?
Activity 30: Communication Process
What is the process? Certain input, to get desired output based on the certain steps
Risk treatment Plan:
Performance Evaluation
Internal AuditAlso called as Aide Memory
Has Security been employed?
Scope: Physical Security
Leadership = guidance’s [leadership are Born]
Management = controls [Mangers are created]
Example:
****************************************************************
Why ISMS?
Improved security for the organization and its clientsClause 4: Context of Org
Clause 6: Planning
A risk assessment process should then be defined that identifies risks associated with the
loss of confidentiality, integrity and availability for information within the scope of the ISMS,
analyses the risks and then evaluates them
Clause 7: Support
Leadership will provide the support
Clause 8: Operation
Info sec Risk Assessment
Info sec Risk Treatment
Statement of Applicability: 114 Controls are present. When the controls are not applied, then the reason will be provided.
Clause 9: Performance evaluation
Internal Audits
Management Review
Clause 10: Improvement
Non-Conformity and corrective action
Continual Improvement
Implementation: of ISMS -
Determine the Need for Documentation
Baseline Gap Analysis
Project Plan: Gannt Chart
Scope of ISMS
Leadership Commitments and Roles, responsibility & Authorities.
Reduce/ Treat
Avoid/ Terminate
Accept/ Tolerate
Transfer/ share
Audit:
Intent
implement
Effectiveness
Non conformity reports
Management Review
Change Management
Comments
Post a Comment