How the standard works ISO/IEC 27001:2005







most organizations have number of information security controls. however, without information security management system (isms), controls tend disorganized , disjointed, having been implemented point solutions specific situations or matter of convention. security controls in operation typically address aspects of or data security specifically; leaving non-it information assets (such paperwork , proprietary knowledge) less protected on whole. moreover, business continuity planning , physical security may managed quite independently of or information security while human resources practices may make little reference need define , assign information security roles , responsibilities throughout organization.


iso/iec 27001 requires management:



systematically examine organization s information security risks, taking account of threats, vulnerabilities, , impacts;
design , implement coherent , comprehensive suite of information security controls and/or other forms of risk treatment (such risk avoidance or risk transfer) address risks deemed unacceptable; and
adopt overarching management process ensure information security controls continue meet organization s information security needs on ongoing basis.

technical security controls such antivirus , firewalls not audited in iso/iec 27001 certification audits: organization presumed have adopted necessary information security controls since overall isms in place , deemed adequate satisfying requirements of iso/iec 27001.


management determines scope of isms certification purposes , may limit to, say, single business unit or location. iso/iec 27001 certificate not mean remainder of organization, outside scoped area, has adequate approach information security management.


other standards in iso/iec 27000 family of standards provide additional guidance on aspects of designing, implementing , operating isms, example on information security risk management (iso/iec 27005).







Comments

Popular posts from this blog

CACHEbox ApplianSys

Kinship systems Apache

Western Apache Apache