How the standard works ISO/IEC 27001:2005
most organizations have number of information security controls. however, without information security management system (isms), controls tend disorganized , disjointed, having been implemented point solutions specific situations or matter of convention. security controls in operation typically address aspects of or data security specifically; leaving non-it information assets (such paperwork , proprietary knowledge) less protected on whole. moreover, business continuity planning , physical security may managed quite independently of or information security while human resources practices may make little reference need define , assign information security roles , responsibilities throughout organization.
iso/iec 27001 requires management:
systematically examine organization s information security risks, taking account of threats, vulnerabilities, , impacts;
design , implement coherent , comprehensive suite of information security controls and/or other forms of risk treatment (such risk avoidance or risk transfer) address risks deemed unacceptable; and
adopt overarching management process ensure information security controls continue meet organization s information security needs on ongoing basis.
technical security controls such antivirus , firewalls not audited in iso/iec 27001 certification audits: organization presumed have adopted necessary information security controls since overall isms in place , deemed adequate satisfying requirements of iso/iec 27001.
management determines scope of isms certification purposes , may limit to, say, single business unit or location. iso/iec 27001 certificate not mean remainder of organization, outside scoped area, has adequate approach information security management.
other standards in iso/iec 27000 family of standards provide additional guidance on aspects of designing, implementing , operating isms, example on information security risk management (iso/iec 27005).
Comments
Post a Comment