ISO27001 in Plain English
20th November 2019
However, not all information has the same value or sensitivity (compare a confidential password database with publicly available brochures, for example), so we need to take a look at three characteristics to determine how much protection it needs:
- Confidentiality – can it only be seen by persons that are authorised to see it
- Integrity – can the information be trusted, has it been modified without authority?
- Availability – ensuring that information can be accessed as and when required
We can start to see that sensible business systems and processes will help us provide appropriate protection for each of these considerations. For example, confidentiality can be maintained by user names, strong passwords and proper logging of user activity. Integrity is assisted by implementing access control to minimise access, or perhaps by having regular back-up media which could be recovered. Availability considers many things, from the resilience of power, networks and systems – through to our business continuity arrangements.
Sprinkle on some risks…
Think about all the things that could in some way affect your organisation’s valuable data, or perhaps the buildings or infrastructure upon which it depends for its security. There are many of these, for the sake of a short blog, here’s a small selection of risks which should be assessed by an organisation:
- risks of information theft by an employee, or a contractor
- damage to information from a computer virus outbreak, or theft by some form of malware
- disclosure of information to the wrong customer from unchecked software changes
- server failure due to hard drive capacity issues
- risks to your data centre environment due to historical flood risks or proximity to an airport
Some risks will happen on a more frequent basis than others, whilst some will have a major impact and others relatively minor. So alongside the identification of risks, we should seek to understand the probability of them actually happening, and the impact if they did.
… and stir in carefully selected controls
There are lots of “bad things” which we need to identify, and do all we can to remove or at the very least minimise to an acceptable level. You’re hopefully already doing sensible things, so for our five examples above you could be implementing:
- employment contract clauses, supplier agreements, and appropriate activity monitoring
- robust anti-virus and anti-malware protection, ensuring it is updated regularly
- formal change management for all software changes, involving multiple personnel
- infrastructure capacity checks, taking action when pre-agreed thresholds are reached
- environmental checks, ensuring your valuable infrastructure is protected from risks
The ISO27001 (2013) standard offers 114 controls which could be implemented, but there’s nothing to stop you adding in additional controls if you think they are appropriate.
Statement of Applicability
The ISO27001 standard requires a “Statement of Applicability” to illustrate how controls have been implemented to protect your organisation’s assets.Your risk assessment activities above may indicate to you that some controls are weak or inappropriate, so opportunities should be taken to implement more robust controls, or perhaps transfer the risks to a more suitable third party, or maybe even stop undertaking the risky activities altogether.
Is That All?
Not quite. Whilst asset identification, risk assessment and control implementation may require a clear head and a good supply of strong black coffee, there’s a number of related activities which ISO27001 expects to see. Once again we’ll spare you a long list, but think along the following lines:
- Involving your senior management, demonstrating their agreement and commitment to information security objectives which protect your business
- An appropriate framework of information security policies and procedures, and records to demonstrate how they’ve been followed
- A comprehensive employee and contractor security education programme – they need to understand their roles and responsibilities
- Internal audit activities, a programme of formal checks taking an objective view of how well your information security plans are working
- Improvement initiatives – doing things better when there is an opportunity to do so.
We hope that this end of the blog finds you more informed than ten minutes ago. With our help, protecting your business and gaining ISO27001 certification is a realistic and achievable goal.