How to implement ISO 27001 Walkthrough - Part 1

Stuart Barker
30 Mar 202212:16

Summary

TLDRThe video script focuses on the implementation of an Information Security Management System (ISMS) as per ISO 27001 standards. It emphasizes understanding the organization's context, including internal and external issues that may impact information security. The speaker outlines the importance of documenting and managing these factors through a risk register. The script also highlights the need for leadership commitment and communication, as well as defining the scope of the ISMS to meet client expectations and ensure continual improvement. It touches on the creation of policies and procedures to guide staff behavior and the allocation of resources to demonstrate the organization's seriousness about information security.

Takeaways

  • 📝 The script discusses the importance of understanding the organization's context, including internal and external issues that could impact information security management.
  • 🔍 It emphasizes the need to identify and articulate the organization's objectives, goals, and culture as part of the information security management system.
  • 🏢 The speaker mentions that external factors such as legislation changes, Brexit, and GDPR, as well as relationships with stakeholders, should be considered in the security management system.
  • 📋 The process of documenting internal and external issues is suggested, starting with identifying them in a document and applying them to a risk register for management.
  • 🕵️‍♂️ Auditors are highlighted as a driving force for documenting and addressing issues, as they seek to find and resolve potential problems within the system.
  • 🤝 Understanding the needs and expectations of interested parties, such as stakeholders, is crucial for defining the scope of the information security management system.
  • 📉 The scope of the system should be defined based on what the client is asking for, and it's important to document this scope to meet the requirements of the end customer.
  • 🔑 Leadership is a key component of the ISO standards, with a focus on management buy-in and demonstrating commitment to information security objectives.
  • 🗣️ Communication plans and policies are essential to ensure that all stakeholders understand their roles and responsibilities within the information security management system.
  • 📚 The script mentions the creation of a suite of policies that logically separates what the organization does from how it does it, allowing for transparency and accountability.
  • 🔄 Continual improvement is a specific requirement of the standard, and the script outlines a process involving internal audits, management reviews, and risk management to achieve this.

Q & A

  • What is the main purpose of understanding the context of an organization in the context of information security?

    -The main purpose is to identify and articulate the organization's internal and external issues that may impact its ability to deliver information security. This includes understanding the organization's culture, objectives, goals, and adapting the information security management system to address potential risks.

  • What are the external factors that an organization should consider when assessing its information security management system?

    -External factors include legislation changes such as Brexit or GDPR, relationships with stakeholders, and physical and environmental factors in the surrounding environment. These factors may affect the organization's ability to maintain information security.

  • How does an organization typically document and manage the internal and external issues identified in its information security management system?

    -The organization should identify these issues in a document and apply them to a risk register. The issues are then managed through a risk management process, potentially in conjunction with other risk management activities.

  • What is the importance of having a clear understanding of the needs and expectations of interested parties in an organization's information security management?

    -Understanding the needs and expectations of stakeholders is crucial for defining the scope of the information security management system, ensuring that it meets the requirements of those parties and facilitates a process of continual improvement.

  • Why is defining the scope of an information security management system so important?

    -Defining the scope is key because it helps to ensure that the system is tailored to the specific needs and objectives of the organization. It also helps to manage the certification process effectively and to demonstrate compliance to stakeholders.

  • What is the significance of leadership in the context of ISO 27001 and information security management?

    -Leadership is significant because it drives management buy-in and ensures that information security is integrated into the organization's objectives. It also demonstrates commitment at the senior level, which is essential for the successful implementation and maintenance of the information security management system.

  • How does an organization demonstrate leadership commitment to information security?

    -An organization can demonstrate leadership commitment through various means, such as including information security in the objectives of the organization, ensuring it is well communicated, and showing buy-in at the senior level. This can be evidenced through policies, procedures, and resource allocation.

  • What is the role of policies in an information security management system?

    -Policies play a crucial role in defining what the organization expects in terms of information security behavior and practices. They provide a clear framework for staff to operate within and help to communicate the organization's stance on information security.

  • Why is it important to logically separate policies from procedures in an information security management system?

    -Logically separating policies from procedures allows the organization to share its high-level objectives and commitments externally without revealing sensitive details or confidential data. It also simplifies the process of updating and maintaining these documents.

  • How does an organization ensure that its information security management system is continually improving?

    -An organization ensures continual improvement through processes such as internal audits, management reviews, and feedback mechanisms. These processes help identify areas for improvement and drive changes that enhance the effectiveness of the information security management system.

Outlines

00:00

📚 Understanding Organizational Context and Information Security Management

The first paragraph focuses on the importance of understanding an organization's context in relation to information security management. It emphasizes the need to articulate the organization's identity, objectives, goals, and culture. The speaker discusses the necessity of considering both internal and external issues that could impact information security, such as legislation changes, relationships with stakeholders, and physical environmental factors. The paragraph introduces the concept of documenting these considerations in a risk register and managing them through risk assessment. It also touches on the role of auditors and the importance of providing them with clear documentation to ensure a smooth audit process.

05:02

🎯 Defining the Scope and Continual Improvement in Information Security Management

The second paragraph delves into defining the scope of an information security management system (ISMS) and the concept of continual improvement. It stresses the importance of aligning the scope with client requirements and the organization's most significant products and services. The speaker mentions the use of templates for documenting scope and the significance of the scope statement and statement of applicability in certification processes. The paragraph also highlights the structure for continual improvement, including policies, procedures, staff training, incident management, internal audits, external audits, and management review meetings, all aimed at enhancing the ISMS over time.

10:03

👥 Leadership and Policy Development in Information Security

The third paragraph discusses the role of leadership in information security, emphasizing the need for management buy-in and communication of the organization's commitment to information security. It covers the development of policies and procedures that clearly define what the organization does and how it does it, allowing for transparency and accountability. The speaker mentions the creation of policy suites that cover various aspects of information security, such as clear desk policies, software policies, and physical security policies. The paragraph also touches on the importance of documenting roles and responsibilities and the rationale behind having distinct policies for different aspects of the organization's operations.

Mindmap

Keywords

💡Information Security Management System (ISMS)

An Information Security Management System (ISMS) is a framework of policies and procedures that includes all security aspects of the organization's operations. It is designed to ensure the confidentiality, integrity, and availability of information. In the video, the speaker discusses the importance of adapting the ISMS to address both internal and external issues that may impact the organization's ability to deliver information security.

💡Context of Organization

The 'context of organization' refers to understanding the internal and external environment in which an organization operates. It includes factors such as culture, objectives, and external factors like legislation and market trends. The speaker emphasizes the need to articulate this context, as it is crucial for the organization to adapt its ISMS to manage risks and opportunities effectively.

💡Risk Management

Risk management is the process of identifying, assessing, and controlling risks. In the video, the concept is used to describe how organizations should evaluate both internal and external issues that could affect their ISMS. The speaker mentions that understanding these risks is essential for creating a document and applying it to a risk register, which is part of managing the risks.

💡Stakeholders

Stakeholders are individuals or groups who have an interest or stake in the organization. They can include shareholders, customers, employees, or suppliers. The speaker talks about the importance of understanding the needs and expectations of stakeholders, as this influences the scope and implementation of the ISMS.

💡Scope

In the context of ISMS, 'scope' defines the extent of the information security management system, specifying what is included and what is excluded. The speaker highlights the importance of defining the scope correctly, as it is key to certification and ensuring that the ISMS is relevant and effective.

💡Continual Improvement

Continual improvement refers to the ongoing effort to enhance processes, products, or services. The speaker mentions that the ISO standard requires a process for continual improvement, which includes internal audits, management reviews, and feedback mechanisms to ensure the ISMS is constantly evolving and improving.

💡Leadership

Leadership in the context of the video refers to the role of senior management in supporting and driving the ISMS. It includes demonstrating commitment, allocating resources, and communicating the importance of information security throughout the organization. The speaker discusses how leadership buy-in is critical for the success of the ISMS.

💡Policies and Procedures

Policies are the overall strategies or principles of an organization, while procedures are the detailed steps to implement those policies. The speaker explains that separating policies from procedures allows for clear communication of what the organization does and how it does it, which is essential for effective information security management.

💡Internal Audits

Internal audits are assessments conducted within an organization to evaluate its own processes and systems. The speaker mentions that internal audits are part of the continual improvement process, helping to identify areas for improvement and ensuring compliance with the ISMS.

💡Management Review

A management review is a process where senior management evaluates the effectiveness of the organization's policies, objectives, and processes. The speaker refers to management reviews as a critical component of the ISMS, where decisions may be made to enhance the system, such as adding items to a risk register.

💡ISO 27001

ISO 27001 is an international standard that specifies the requirements for an ISMS. The speaker uses this standard as a reference point throughout the video, discussing how it guides the organization in implementing and maintaining an effective information security management system.

Highlights

Understanding the organization's context is crucial for articulating information about the company, its objectives, and culture.

Identifying internal and external issues is akin to managing risks, which can impact information security.

External factors such as legislation changes and stakeholder relationships can influence information security management.

Internal issues might include resource allocation for running an information security management system.

Auditors seek evidence of consideration for both internal and external issues within an organization.

Documenting and managing risks through a risk register is a recommended practice.

Understanding the needs and expectations of stakeholders is essential for effective information security management.

Defining the scope of an information security management system is critical and should align with customer requirements.

ISO 27001 certification involves documenting the scope and controls applied, which is important for security and compliance.

Leadership and management buy-in are vital for the success of an information security management system.

Demonstrating leadership commitment through policies, procedures, and communication plans is necessary.

Policies should be clearly communicated and separated from procedures to ensure understanding and accountability.

Roles and responsibilities within an organization should be well-documented for clarity and accountability.

A communication plan is essential for discussing and disseminating information about information security.

The importance of having a clear information security policy with a statement from the chief executive.

The process of continual improvement is a key component of the ISO 27001 standard.

Transcripts

play00:02

so let's look at we'll do a couple of

play00:04

the sections uh

play00:05

today i won't overload you with it but

play00:08

then we can come back

play00:10

so the first clause that we're going to

play00:11

look at here is the context of

play00:13

organization

play00:14

so this basically just says what i've

play00:16

just said which is

play00:17

we need to unders understand

play00:20

our own context there are things that we

play00:22

need to be able to to to be able to

play00:24

articulate about ourselves

play00:27

and again it's an easy win for a client

play00:29

right the ability to write down who who

play00:31

are you

play00:32

you know what do you do

play00:34

what are your objectives what are your

play00:36

goals as i say what's your culture

play00:40

here it wants us to look at in what it's

play00:42

calling internal and external issues

play00:46

internal and external issues are almost

play00:48

like risks really

play00:50

and i'm going to show you how we do this

play00:53

later not today today we're just

play00:55

touching on what it wants to see

play00:56

so what it wants to see is that we've

play00:58

looked at our information security

play01:00

management system we've looked at our

play01:01

organization and we've said yes these

play01:03

external things

play01:05

may have an impact on our ability to

play01:07

deliver information security

play01:09

so external things could be legislation

play01:13

changes in brexit changes in

play01:15

gdpr

play01:17

external things could be relationships

play01:19

with stakeholders

play01:21

you know have you got a funding board

play01:22

that sits over the top of it non-exec

play01:24

directors

play01:26

it could be

play01:27

uh physical and environmental something

play01:30

in the environment that's around you so

play01:32

it's just saying look have you had a

play01:33

look looked at your organization in the

play01:35

in the wider hall and then adapted your

play01:37

information security management system

play01:39

to address some of that

play01:41

and the first way that we would do that

play01:42

is to identify that in a document and

play01:45

then apply that to a risk register and

play01:47

then manage that through risk

play01:49

potentially but we'll touch on that

play01:50

another day

play01:52

internal issues are things normally

play01:53

again

play01:54

we are going to show in our

play01:55

implementation

play01:57

internal issues even if they're not an

play01:58

issue

play01:59

and the reason we're going to do that is

play02:00

because we're going to show that we

play02:02

considered them

play02:03

so what an auditor likes to do right

play02:05

auditors again

play02:06

right let's come back to that

play02:09

so auditors like they like to find

play02:12

things

play02:13

right sometimes we leave them things to

play02:16

find otherwise they get sad and upset

play02:18

and they think oh my god like i'm adding

play02:20

no value here

play02:22

sometimes the things that they pick up

play02:24

on will be pedantic as hell because they

play02:25

can't find out on anything big

play02:28

but things like internal and external

play02:30

issues if i put in their internal issue

play02:33

potentially we don't have the right

play02:35

resources to run an information security

play02:36

management system but we have taken on

play02:39

board a third party is it on the risk

play02:42

register no then we've assessed it if

play02:44

you don't do it they'll just ask you

play02:46

they'll just say okay so when you were

play02:48

looking at your organization did you did

play02:49

you did you consider brexit did you

play02:51

consider gdpr did you consider internal

play02:54

resources you're like yes we considered

play02:56

it and we wrote it down for you fella

play02:57

look

play02:58

it's there and ah damn on to the next

play03:01

one

play03:02

this is like second-guessing

play03:04

what it is that they're looking to pick

play03:06

up on and again providing them

play03:07

information in a way that's going to

play03:09

smooth and ease that process through

play03:11

okay

play03:13

clearly it does add some value right i

play03:14

mean it is going to add some value but

play03:15

that's a big part of what is a big part

play03:17

of what we're trying to do

play03:19

let's go back to that

play03:25

understanding the needs and expectations

play03:27

of interested parties

play03:29

so again we're starting to look at

play03:31

things like our stakeholders our

play03:33

stakeholder analysis and what they want

play03:35

to see

play03:36

we've got information on that and an

play03:38

approach to that

play03:40

we're going to define the scope of our

play03:42

information security management system

play03:46

and we're going to implement this

play03:47

process of continual improvement right

play03:50

scope

play03:52

getting scope right is absolutely key

play03:56

all right so

play03:57

as we've discussed discussed many times

play04:00

there are

play04:01

smart ass

play04:04

professionals within our community who

play04:06

say 27001 isn't worth the paper it's

play04:08

written on because you could just say

play04:10

that this broom cupboard over here is 27

play04:12

01 and therefore how does that make you

play04:14

any more secure and then you go

play04:16

technically you are correct you are

play04:18

technically correct but the question

play04:20

that you always ask anybody is are you

play04:21

27 0001 and can i have a copy of your

play04:24

scope statement

play04:25

because what i want to know is what is

play04:27

it that you certified and then actually

play04:29

you ask them for a copy of their

play04:30

statement of applicability as well

play04:31

because you want to know the controls

play04:32

they've applied but those two the scope

play04:35

statement documents are key

play04:37

so when we're working with when we're

play04:39

working with our client we're going to

play04:40

say we're going to document and we we

play04:42

need to document the scope there's a

play04:43

structure and a template for that we're

play04:45

going to try and restrict the scope to

play04:47

the minimum requirement

play04:49

that the organization has in the first

play04:51

pass especially if this is the first

play04:53

pass

play04:54

ah we want the company to be 27 0001

play04:57

okay nice aspiration so you want to go

play04:59

through the full rigor of all of this

play05:02

in relation to like your crm

play05:05

marketing databases finance databases

play05:07

things nobody's bothered about really

play05:09

you want to go through all of that rigor

play05:12

not a problem let's push it out by two

play05:14

years because you're big you've got too

play05:16

many things now in play

play05:18

how do we define scope the way that we

play05:20

define scope or the first step to

play05:22

defining scope is

play05:25

what is your client asking you for

play05:28

right

play05:29

because we're only going to do whatever

play05:31

it is we're being asked for if client

play05:33

says to me you build widgets

play05:36

all right are you 27 0001 and you go oh

play05:39

yeah i'm on 271 for booking holidays it

play05:41

goes but i don't book holidays with you

play05:43

i buy widgets right yeah

play05:46

so we are going to do the scope around

play05:48

widgets that's what we are going to

play05:50

define our scope for that's what we're

play05:52

going to go forward for certification

play05:53

for because it meets the requirement of

play05:55

the end customer

play05:57

if our customer doesn't our customer

play05:59

doesn't know the answer to that

play06:02

then we will have a process that says

play06:04

what are the products and services that

play06:05

we deliver

play06:07

on which one of these is the one we sell

play06:10

the most of that we want to put that

play06:12

band and that badge on

play06:14

so there is a process we can go through

play06:15

to help through to help them but it

play06:18

should become self-evident they'd be

play06:19

like whatever it is that they deliver to

play06:21

client that's the only thing that that

play06:23

client

play06:24

is interested in is what i am buying

play06:26

from you to secure the supply chain is

play06:29

that twenty seven thousand and one so

play06:31

that helps your client to define what it

play06:32

is that is their scope

play06:35

so we've got templates that look at

play06:36

scope and then in the context of

play06:38

organization it's looking at continual

play06:40

improvement

play06:42

now again we've got a structure we

play06:43

touched on that on the last session

play06:45

where we talked about on the left-hand

play06:47

side policies procedures applied to

play06:49

staff staff our staff having incidents

play06:51

incidents lead to continuing improvement

play06:53

internal audits they need to get an

play06:55

external audit they lead to continual

play06:56

improvement

play06:58

etc

play06:59

that we

play07:00

report that back to the management

play07:01

review meeting management review meeting

play07:03

makes a decision maybe adds it to a risk

play07:05

register etc so i'm not teaching you

play07:07

continuing improvement right now but i'm

play07:09

saying that this standard wants it it

play07:11

calls it out specifically and that we

play07:12

have that built into it

play07:15

let's go back to that

play07:20

the next section is

play07:21

uh

play07:22

is leadership

play07:24

so i'm flipping i'm flipping in and out

play07:26

because it's better to look at me then

play07:27

look at a spreadsheet you can read the

play07:28

spreadsheet later

play07:30

so

play07:31

the iso standards

play07:33

again they're about that management

play07:35

buy-in and this is a good i think it's a

play07:37

good thing you know many good things i

play07:38

like about 27001 from risk management

play07:41

but also that demonstration of

play07:43

leadership and leadership buying you

play07:45

know it wants to see that it's baked

play07:47

into the objectives of the organization

play07:50

that the uh that it's well communicated

play07:53

that there is buy in at that senior

play07:55

level there's a whole heap of things

play07:57

that we're going to do in our isms to

play07:59

help to drive and evidence that

play08:01

things that we're going to have in terms

play08:02

of you know contracts of employment that

play08:04

say certain things

play08:06

the way that we've recorded what

play08:08

resources are allocated to demonstrate

play08:10

that we take it seriously we've

play08:11

allocated resources to it and we can

play08:13

show that

play08:15

we're going to have things like a

play08:16

communication plan that shows when we're

play08:18

going to discuss things and when and

play08:19

when we did discuss it

play08:22

in our information security policy we've

play08:24

got a chief exec statement

play08:26

now i always say i provide a templated

play08:28

version of that i always do say try and

play08:30

change it to make it your own words

play08:32

because i think i've been on 15 audits

play08:34

where every ceo says exactly the same

play08:36

thing

play08:41

that's fine maybe they're all aligned in

play08:42

the zeitgeist right they're like looking

play08:44

at their heads

play08:48

so but we're going to show that

play08:49

demonstration right we're going to show

play08:50

that we've got that leadership

play08:51

commitment so there's a whole

play08:53

section here

play08:55

uh that looks at leadership and again

play08:57

that's that's mapped to the document so

play08:58

i don't need to worry about that until

play09:00

we get into each document

play09:04

so i'm showing you in here

play09:06

policies we're going to have a a suite

play09:09

of policy

play09:11

policies statements of what we do not

play09:13

how we do it how we do it is covering

play09:15

procedures

play09:16

we logically separate

play09:18

uh what we do from how we do it that

play09:21

enables us to be able to share what we

play09:23

do externally because it won't have gdpr

play09:25

confidential data in it it's not going

play09:27

to have mobile phone numbers and you

play09:28

know in disaster recovery policies

play09:31

they're going to be deep within the

play09:32

plans

play09:33

so we're going to logically separate

play09:35

that out we're going to have a pack of

play09:37

policies that for a small organization

play09:39

can sometimes seem as overkill

play09:42

but the reason that we've got it we've

play09:43

got a clear desk policy a software

play09:45

policy a physical security policy a

play09:47

change management policy some of them

play09:49

are only one or two pages long

play09:52

yes it can seem as overkill but the

play09:54

reason we've done it again

play09:56

as you grow you can allocate a policy to

play09:58

a person or a department so not

play10:00

everybody's updating one massive

play10:02

document and we want to do that we want

play10:05

to allocate policies and documents to

play10:07

owners for accountability purposes

play10:10

it also allows us to satisfy

play10:12

questionnaires if you've ever been

play10:13

involved in them they will call these

play10:15

documents out by name do you have a

play10:17

change management policy do you have a

play10:19

clear desk policy so rather than sending

play10:21

them a 50 page one document

play10:24

you know we send them what they've asked

play10:25

for yeah change bank gone

play10:27

so we are going to have a we are going

play10:29

to have a process sorry we're going to

play10:31

have a series of policies that explain

play10:32

to the business what they do

play10:35

we've got a process at the back of that

play10:36

about communicating that

play10:39

we can't expect people to operate in a

play10:42

way unless we tell them the way that we

play10:44

expect them to operate and that's one of

play10:46

the things that policies does it says

play10:48

this is what we expect of you

play10:50

outside of my gift of my remit and above

play10:53

my pay grade there's a whole

play10:54

conversation about hr's ability to

play10:56

discipline

play10:57

um if you haven't explained to somebody

play10:59

what it is that you expect them to do so

play11:01

if you have a data breach and you say oh

play11:03

you emailed everything out to all the

play11:05

customer

play11:06

an employee he says well you never told

play11:08

me not to

play11:09

what are you going to do how are you

play11:11

going to how are you going to discipline

play11:12

them they're just going to go okay

play11:15

now we'll tell you now now we'll get

play11:16

some policies in place

play11:18

yeah so there's a whole hr reason for

play11:20

policy as well that sits at the back

play11:24

then we've got a piece around

play11:25

organization

play11:27

roles and responsibilities and again

play11:30

we're going to document some of what

play11:32

those roles and responsibilities are

play11:34

okay

play11:38

so in terms of today with 10 minutes

play11:40

left i'm going to call it there you'll

play11:42

have to remind me next week how far we

play11:43

got because i will forget

play11:45

and we're up to planning so we've just

play11:47

done we've just finished off on the on

play11:49

the leadership side of it

play11:50

and i'll just carry on walking through

play11:52

what the expectation of the standard is

play11:54

so you can get a feel for it you'll have

play11:56

the document that's mapped so you can

play11:58

always go back to it and then when we

play12:00

get to the next stage it's tend to go

play12:01

through each document and say right

play12:03

we've now got this document called the

play12:04

risk register how does it work but you

play12:07

understand the context of why we've got

play12:09

it because you'll see here in the in the

play12:11

standard that it's asked for it

Rate This

5.0 / 5 (0 votes)

Related Tags
ISO 27001Information SecurityOrganizational ContextLeadership CommitmentPolicy DevelopmentRisk ManagementStakeholder AnalysisCompliance AuditingInternal ControlsExternal FactorsContinual Improvement