ISMS Implementation Guide and Examples
ISMS Implementation Guide and Examples
Usage note
Note: The intent of this document is to help you recognize the activities related to establishing an ISMS. This document should not be considered as professional consulting for establishing or implementing an ISMS. Use of this guide does not guarantee a successful implementation nor an implementation that is ready for certification. If you want to implement an ISMS, consider hiring a professional consultant who specializes in ISMS implementation.
Table of contents
Overview of an ISMS ........................................................................................ 4 1 2 3 4 5 6 7 8 9 Purchase a copy of the ISO/IEC standards .................................................. 6 Obtain management support ..................................................................... 6 Determine the scope of the ISMS ............................................................... 9 Identify applicable legislation ................................................................... 10 Define a method of risk assessment ......................................................... 11 Create an inventory of information assets to protect ............................... 14 Identify risks ............................................................................................. 15 Assess the risks ........................................................................................ 16 Identify applicable objectives and controls ............................................... 19
10 Set up policy and procedures to control risks ........................................... 23 11 Allocate resources and train the staff ....................................................... 24 12 Monitor the implementation of the ISMS .................................................. 25 13 Prepare for certification audit ................................................................... 26 14 Ask for help .............................................................................................. 27 Appendix A Documents and Records.............................................................. 28
Overview of an ISMS
Information security is the protection of information to ensure: Confidentiality: ensuring that the information is accessible only to those authorized to access it. Integrity: ensuring that the information is accurate and complete and that the information is not modified without authorization. Availability: ensuring that the information is accessible to authorized users when required.
Information security is achieved by applying a suitable set of controls (policies, processes, procedures, organizational structures, and software and hardware functions). An Information Security Management System (ISMS) is way to protect and manage information based on a systematic business risk approach, to establish, implement, operate, monitor, review, maintain, and improve information security. It is an organizational approach to information security. ISO/IEC publishes two standards that focus on an organizations ISMS: The code of practice standard: ISO/IEC 27002 (ISO/IEC 17799). This standard can be used as a starting point for developing an ISMS. It provides guidance for planning and implementing a program to protect information assets. It also provides a list of controls (safeguards) that you can consider implementing as part of your ISMS. The management system standard: ISO/IEC 27001. This standard is the specification for an ISMS. It explains how to apply ISO/IEC 27002 (ISO/IEC 17799). It provides the standard against which certification is performed, including a list of required documents. An organization that seeks certification of its ISMS is examined against this standard.
These standards are copyright protected text and must be purchased. (For purchasing information, refer to section 1, Purchase ISO standards.) The standards set forth the following practices: All activities must follow a method. The method is arbitrary but must be well defined and documented. A company or organization must document its own security goals. An auditor will verify whether these requirements are fulfilled. All security measures used in the ISMS shall be implemented as the result of a risk analysis in order to eliminate or reduce risks to an acceptable level. The standard offers a set of security controls. It is up to the organization to choose which controls to implement based on the specific needs of their business. A process must ensure the continuous verification of all elements of the security system through audits and reviews. A process must ensure the continuous improvement of all elements of the information and security management system. (The ISO/IEC 27001 standard adopts the Plan-Do-Check-Act [PDCA] model as its basis and expects the model will be followed in an ISMS implementation.)
These practices form the framework within which you will establish an ISMS. The sections that follow describe the steps involved in establishing an ISMS. Note: It is important to remember that although this guide provides examples, the implementation of an ISMS is process-based and specific to your organization. Consider using the guide and examples as a starting point of discussion within your organization, rather than as a set of templates.
The ANSI online store: http://webstore.ansi.org The ISO Online Shop: http://www.iso.ch
In addition, management will participate in the ISMS Plan-Do-Check-Act [PDCA] process, as described in ISO/IEC 27001 by: Determining the acceptable level of risk. Evidence of this activity can be incorporated into the risk assessment documents, which are described later in this guide. (See steps 6 through 8.) Conducting management reviews of the ISMS at planned intervals. Evidence of this activity can be part of the approval process for the documents in the ISMS. Ensuring that personnel affected by the ISMS are provided with training, are competent for the roles and responsibilities they are assigned to fulfill, and are aware of those roles and responsibilities. Evidence of this activity can be through employee training records and employee review documents.
Example:
This example shows a possible policy statement with goals and objectives. Security Policy Protection of company assets is vital to the success of our business. To this end, we have established an information security management system that operates all the processes required to identify the information we need to protect and how we must protect it. Because the needs of our business change, we recognize that our management system must be continually changed and improved to meet our needs. To this effect, we are continually setting new objectives and regularly reviewing our processes. Objectives It is the policy of our company to ensure: Information is only accessible to authorized persons from within or outside the company. Confidentiality of information is maintained. Integrity of information is maintained throughout the process. Business continuity plans are established, maintained, and tested. All personnel are trained on information security and are informed that compliance with the policy is mandatory. All breaches of information security and suspected weaknesses are reported and investigated. Procedures exist to support the policy, including virus control measures, passwords, and continuity plans. Business requirements for availability of information and systems will be met. The Information Security Manager is responsible for maintaining the policy and providing support and advice during its implementation. All managers are directly responsible for implementing the policy and ensuring staff compliance in their respective departments. This policy has been approved by the company management and shall be reviewed by the management review team annually: Signature: _____________________________ ____________________________ Title: __________________________________ Figure 1: Example of Security Policy Date:
While reviewing these lists, you might want to answer questions similar to the following:
Important: Keep your scope manageable. Consider including only parts of the organization, such as a logical or physical grouping within the organization. Large organizations might need several Information Security Management Systems in order to maintain manageability. For example, they might have one ISMS for their Finance department and the networks used by that department and a separate ISMS for their Software Development department and systems. Results: A documented scope for your ISMS. When you have determined the scope, you will need to document it, usually in a few statements or paragraphs. The documented scope often becomes one of the first sections of your organizations Security Manual. Or, it might remain a standalone document in a set of ISMS documents that you plan to maintain. Often the scope, the security policy, and the security objectives are combined into one document. For additional guidance, refer to the following example.
Example:
Scope and Purpose The company is committed to protecting its information and that of its customers. To achieve this goal, the company has implemented an Information Security Management System in accordance with ISO/IEC 27001: 2005. The companys ISMS is applicable to the following areas of the business: Finance department Internal IT systems and networks used for back-end business (such as email, timesheets, contract development and storage, and report writing)
(Note: IT systems on which company software is developed and stored are part of the Software Development ISMS. Refer to the Software Development Security Manual for more information.)
Integrity Safeguarding the accuracy and completeness of information and processing methods The unauthorized modification or destruction of information could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The unauthorized modification or destruction of information could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The unauthorized modification or destruction of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.
Availability Ensuring that authorized users have access to information and associated assets when required The disruption of access to or use of information or an information system could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The disruption of access to or use of information or an information system could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The disruption of access to or use of information or an information system could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.
Set objectives to reduce risk to an acceptable level Determine criteria for accepting risk Evaluate risk treatment options.
There are many risk assessment methods you can choose from, such as those that are prevalent in your industry. For example, if your company is in the oil industry, you might find there are risk assessment methods related to that industry. What you will need: If you are unfamiliar with risk assessment methods, you might want to refer to these published examples: ISO/IEC 13335 (Management of information and communications technology security) NIST SP 800-30 (Risk Management Guide for Information Technology Systems) http://csrc.nist.gov/publications/nistpubs/ Risk assessment methods that are specific to the industry of your organization.
Results: When you have completed this step, you should have a document that explains how your organization will assess risk, including: the organizations approach to information security risk management criteria for information security risk evaluation and the degree of assurance required
Note: In subsequent steps, which are described in this guide, you will add more information to this document, which will define the assets that need to be protected, the risks associated with each of those assets, and a list of the controls that will be used to reduce or eliminate the risks. For additional guidance, refer to the following example.
Example: This example provides a possible outline for a risk assessment document that defines the risk assessment methodology.
Table of Contents Introduction Preparation Scope and boundaries Security Objectives and Security Requirements Acceptable Risks Description of Major Vulnerabilities Description of Major Threats Residual Risks Uncertainty Analysis Assumptions External Dependencies Planned Improvements Effectiveness of Controls Planned Controls Assessment of Residual Risk Key and definitions Risk Value Color Scale Definitions of Confidentiality, Integrity, Availability, Accountability and the Consequences of Their Absence Definitions of key terms (such as asset, risk, threat vulnerability, information, data, control)
Strategic Information
CEO
CEO PC
Project plans
CEO
CEO PC
Medium
Figure 6: Example of Asset Table with Placeholder Columns for Assessment Information
7 Identify risks
Next, for each asset you defined in the previous step, you will need to identify risks and classify them according to their severity and vulnerability. In addition, you will need to identify the impact that loss of confidentiality, integrity, and availability may have on the assets. To begin identifying risks, you should start by identifying actual or potential threats and vulnerabilities for each asset. A threat is something that could cause harm. For example, a threat could be any of the following: A declaration of the intent to inflict harm or misery Potential to cause an unwanted incident, which may result in harm to a system or organization and its assets Intentional, accidental, or man-made act that could inflict harm or an act of God (such as a hurricane or tsunami)
A vulnerability is a source or situation with a potential for harm (for example, a broken window is a vulnerability; it might encourage harm, such as a break in). A risk is a combination of the likelihood and severity or frequency that a specific threat will occur. What you will need: The list of assets that you defined in the previous step The risk assessment methodology you defined in step 5
For each asset, you should identify vulnerabilities that might exist for that asset and threats that could result from those vulnerabilities. It is often helpful to think about threats and vulnerabilities in pairswith at least one pair for each asset and possibly multiple pairs for each asset. Results: For each asset, you will have a threat and vulnerability description and, using your Risk Assessment methodology, you will assign levels of confidentiality, integrity, and availability to that asset. If you used a table for step 6, you can add this information to that table, as shown in the following example. Example: Note: In the following example, the Risk Summary column describes the threat and vulnerability. The CIA profile classifies the assets confidentiality, integrity, and availability.
Risk Assessment
Asset Details Own er Locatio n CIA profile Replaceme nt value Risk Summary Risk Value Control Sufficie nt control?
Strategic Information
CEO
CEO PC
High
Project plans
CEO
CEO PC
Medium
For example, you might assign values of Low, Medium, and High to your risks. To determine which value to assign, you might decide that if the value of an asset is high and the damage from a specified risk is high, the value of the risk should also be high, even though the potential frequency is low. Your Risk Assessment Methodology document should tell you what values to use and might also specify the circumstances under which specific values should be assigned. Also, be sure to refer to your Risk Assessment Methodology document to determine the implication of a certain risk value. For example, to keep your ISMS manageable, your Risk Assessment Methodology might specify that only risks with a value of Medium or High will require a control in your ISMS. Based on your business needs and industry standards, risk will be assigned appropriate values.
What you will need: Lists of assets and their associated risks and CIA levels, which you created in the previous step. Possibly input from management as to what level of risk they are willing to accept for specific assets.
Results: When you have completed your assessment, you will have identified which information assets have intolerable risk and therefore require controls. You should have a document (sometimes referred to as a Risk Assessment Report) that indicates the risk value for each asset. In the next step you will identify which controls might be applicable for the assets that require control in order to reduce the risk to tolerable levels. This document can either be standalone or it can be part of an overall Risk Assessment document that contains your risk assessment methodology and this risk assessment. Examples: If you used a table similar to the one in the preceding examples, your result after completing this step might look like the following example:
Risk Assessment
Asset
Details
Owner
Location
CIA profile
Replacement value
Risk Summary
Risk Value
Control
Sufficie control
Strategic Information
CEO
CEO PC
High
High
Project plans
CEO
CEO PC
Medium
Medium
HR documents
Employee records
Company Board
HR Management Company
Medium
Medium
To reduce the risk, you should evaluate and identify appropriate controls. These controls might be controls that your organization already has in place or controls that are defined in the ISO/IEC 27002 (ISO/IEC 17799) standard. (Note: An examination of the controls that you already have in place against the standard and then using the results to identify what controls are missing is commonly called a gap analysis.) What you will need: Annex A of ISO/IEC 27001. This appendix summarizes controls that you might want to choose from. ISO/IEC 27002 (ISO/IEC 17799), which provides greater detail about the controls summarized in ISO/IEC 27001. Procedures for existing corporate controls
Results: You should end up with two documents by completing this step: A Risk Treatment Plan A Statement of Applicability the method selected for treating each risk (accept, transfer, reduce) which controls are already in place what additional controls are proposed the time frame over which the proposed controls are to be implemented
The Statement of Applicability (SOA) documents the control objectives and controls selected from Annex A. The Statement of Applicability is usually a large table in which each control from Annex A of ISO/IEC 27001 is listed with its description and corresponding columns that indicate whether that control was adopted by the organization, the justification for adopting or not adopting the control, and a reference to the location where the organizations procedure for using that control is documented. The SOA can be part of the Risk Assessment document; but usually it is a standalone document because it is lengthy and is listed as a required document in the standard. For additional help with creating a Risk Treatment Plan and a Statement of Applicability, refer to the two sets of examples that follow.
atsec information security corporation | http://www.atsec.com/ | info@atsec.com
Examples of Risk Treatment Plan: If you used a table as described in the preceding steps, the control analysis portion of your Risk Treatment Plan could be covered by the Control column and the Sufficient Control column, as shown in the following example. Note: Any risks that you transfer to others or that you choose to accept as they are should also be recorded in your treatment plan.
Risk Assessment
Asset
Details
Owner
Location
CIA profile
Risk Summary
Risk Value
Control
Strategic Information
CEO
CEO PC
High
15.1.1
Project plans
CEO
CEO PC
Medium
Mediu m
15.1.1
HR documen ts
Employe e records
Compan y Board
HR Manageme nt Company
Medium
Mediu m
Table of Contents Introduction Preparation Scope and boundaries Security Objectives and Security Requirements Acceptable Risks Description of Major Vulnerabilities Description of Major Threats Residual Risks Uncertainty Analysis Assumptions External Dependencies Planned Improvements Effectiveness of Controls Planned Controls Assessment of Residual Risk Key and definitions Risk Value Color Scale Definitions of Confidentiality, Integrity, Availability, Accountability and the Consequences of Their Absence Definitions of key terms (such as asset, risk, threat vulnerability, information, data, control) Asset Valuation Risk Identification, Control Analysis (the Risk Assessment table) Statement of Applicability (could be a summary with pointer to detailed table in a separate document) Rational for Selecting Controls Rational for Excluding Controls
Figure 10: Example of Risk Assessment Document with Assessment Information and SOA Included Example of Statement of Applicability: The following is an excerpt of a Statement of Applicability document. The Reference column identifies the location where the statement of policy or detailed procedure related to the implementation of the control is documented. Two items in the Reference column are incomplete in this example because at this step you might not have a complete set of policies and procedures for all controls. The next step addresses the creation of additional procedures so that you can complete the Statement of Applicability.
Statement of Applicability
Control Headline 5 5.1 Security policy Information security policy Information security policy document
App.
Compliance Statement To provide management direction and support for information security
Reference
5.1.1
yes
The Information Security Policy is provided to New Employees on their first day of employment.
5.1.2
Review of the information security policy Organizing information security Internal organization Management commitment to information security Information security coordination Allocation of information security responsibilities
yes
The Information Security Policy Roles and is reviewed by management on Responsibilities an ongoing basis as apart of document management reviews
6 6.1 6.1.1
yes
Documented in the security policy Through a security forum, training sessions, and day-today work Allocation of information security responsibilities are documented
Company Security Policy l <TBD security procedures> <TBD security procedures> Company Security Manual
6.1.2
yes
6.1.3
yes
10
For each control that you define, you must have corresponding statements of policy or in some cases a detailed procedure. The procedure and policies are used by affected personnel so they understand their roles and so that the control can be implemented consistently. The documentation of the policy and procedures is a requirement of ISO/IEC 27001. What you will need: To help you identify which procedures you might need to document, refer to your Statement of Applicability. To help you write your procedures so that they are consistent in content and appearance, you might want to create some type of template for your procedure writers to use. Results: Additional policy and procedure documents. (The number of documents you produce will depend on the requirements of your organization.) Some of these procedures might also generate records. For example, if you have a procedure that all visitors to your facility must sign a visitors log, the log itself becomes a record providing evidence that the procedure has been followed. Sections 4.3.2 and 4.3.3 of ISO/IEC 27001 require that all documents and records that are part of your ISMS be properly controlled. Therefore, policy and procedure documents must also be created to address these controls. Example: The number of policies, procedures, and records that you will require as part of your ISMS will depend on a number of factors, including the number of assets you need to protect and the complexity of the controls you need to implement. The example that follows shows a partial list of one organizations set of documents: Security Manual Security Policy Risk Assessment Methodology Risk Assessment Report, Asset List, and Treatment Plan Statement of Applicability Roles and Responsibilities document Procedure 1: Workplace Security Procedure 2: Document and Record Control Procedure 3: Training Procedure 4: Server Backups Procedure 5: Audit Procedure Records: Audit Schedule Employee Training Records Employee Review/Evaluation Records Issues/Non-Conformances Server Maintenance Records ..Management Review Records
11
Adequate resources (people, time, money) should be allocated to the operation of the ISMS and all security controls. In addition, the staff who must work within the ISMS (maintaining it and its documentation and implementing its controls) must receive appropriate training. The success of the training program should be monitored to ensure that it is effective. Therefore, in addition to the training program, you should also establish a plan for how you will determine the effectiveness of the training. What you will need: A list of the employees who will work within the ISMS All of the ISMS procedures to use for identifying what type of training is needed and which members of the staff or interested parties will require training Management agreement to the resource allocation and the training plans.
Results: Specific documentation is not required in the ISO/IEC standards. However, to provide evidence that resource planning and training has taken place, you should have some documentation that shows who has received training and what training they have received. In addition, you might want to include a section for each employee that lists what training they should be given. Also, you will probably have some type of procedure for determining how many people, how much money, and how much time needs to be allocated to the implementation and maintenance of your ISMS. Its possible that this procedure already exists as part of your business operating procedures or that you will want to add an ISMS section to that existing documentation. Example: The following example shows a template for an employee training record:
Training Completed
Supervisor / Trainer
Training Planned
12
To ensure that the ISMS is effective and remains current, suitable, adequate, and effective, ISO/IEC 27001 requires:
The results of the reviews and audits must be documented and records related to the reviews and audits must be maintained. What you will need: To perform management reviews, ISO/IEC 27001 requires the following input: results of ISMS internal and external audits and reviews feedback from interested parties techniques, products, or procedures which could be used in the organization to improve the effectiveness of the ISMS preventative and corrective actions (including those that might have been identified in previous reviews or audits) incident reports, for example, if there has been a security failure, a report that identifies what the failure was, when it occurred, and how it was handled and possibly corrected. vulnerabilities or threats not adequately addressed in the previous risk assessment follow-up actions from previous reviews any organizational changes that could affect the ISMS recommendations for improvement
To perform internal audits on a periodic basis, you need to define the scope, criteria, frequency, and methods. You also need the procedure (which should have been written as part of step 10) that identifies the responsibilities and requirements for planning and conducting the audits, and for reporting results and maintaining records. Results: The results of a management review should include decisions and actions related to: Improvements to the ISMS Modification of procedures that effect information security at all levels within the organization Resource needs
The results of an internal audit should result in identification of nonconformities and their related corrective actions or preventative actions. ISO/IEC 27001 lists the activity and record requirements related to corrective and preventative actions.
Example: The following example shows the outline of a preventative action plan. Such a plan might be the result of an internal audit or a management review of the ISMS. You could use a similar outline to prepare a corrective action plan. Preventative Action Plan: Description This section should identify the similar or related occurrences of nonconformances in question. In addition, this section should also identify the corrective actions that were taken for each nonconformance. This section should then also provide reasoning for needing a preventive action to be taken. 1 Action Plan This section shall outline the action plan selected for implementing the preventive action in such that it is clear how the preventive action is to be implemented and what is expected as a result. 1.1 Goal This section shall identify the goal of the action plan. The goal, in most cases, is to prevent future occurrences of the non-conformances identified from reoccurring. 1.2 Method This section shall describe the approach taken to prevent future occurrences of the nonconformances identified from reoccurring. 1.3 Expected Results This section shall identify what is expected as a result of implementing the preventive action. The expected result shall in some way be consistent with the goal described above. 2 Results This section shall identify the results of the preventive action. It may be necessary to list more than one set of results, in cases where you may audit the area of nonconformance more than once after implementing the preventive action. This allows the auditor to examine the consistency between the results. 3 Effectiveness This section identifies the effectiveness in the preventive action selected. The effectiveness may be measured based on the consistency or comparison of the expected results and the actual results. If the results are very similar to each other then the preventive action was very effective.
13
If you plan to have your ISMS certified, you will need to conduct a full cycle of internal audits, management review, and activities in the PDCA process.
The external auditor will first examine your ISMS documents to determine the scope and content of your ISMS. Then the auditor will examine the necessary records and evidence that you implement and practice what is stated in your ISMS. What you will need: All of the documents that you created in the preceding steps. Records from at least one full cycle of management reviews, internal audits, and PDCA activities, and evidence of responses taken as the result of those reviews and audits.
Results: The results of this preparation should be a set of documents that you can send to an auditor for review and a set of records and evidence that will demonstrate how efficiently and completely you have implemented your ISMS.
14
As you can see in this guide, establishing, implementing, and maintaining an ISMS can require a lot of workespecially in its formative stages. If you are new to management systems or specifically to information security management systems, consider hiring a professional ISMS consultant to guide you through the process. A consultants familiarity with the requirements of an ISMS and the suggested controls in the IEO/IEC standards can save you time and money, and will ensure that you will achieve effective security practices and possibly a successful ISMS certification.
As described throughout this guide, your ISMS will depend on many documents and records. Certain documents are required by ISO/IEC 27001 and records are required to provide evidence of the implementation of the ISMS. The following lists provide a summary of the documents and records discussed in previous sections of this guide. Documents Documented statements of the ISMS policy and objectives The scope of the ISMS Procedures and controls in support of the ISMS Description of the risk assessment methodology Risk assessment report Risk treatment plan Documented procedures needed by the organization to ensure the effective planning, operation, and control of its information security processes and describe how to measure the effectiveness of controls Records required by ISO/IEC 27001 Statement of Applicability
The documents listed here can be separate documents or presented together in one or more sets of documents. Records The records required for your ISMS will depend on the requirements of your business. ISO/IEC 27001:2005(E) states that records shall be established and maintained to provide evidence of conformity to requirements and the effective operation of the ISMS. It further states that the ISMS shall take account of any relevant legal or regulatory requirements and contractual obligations. They should be controlled and maintained according to the organizations document control and retention policies and procedures. Some examples of records are: Internal audit records Employee training records Management review minutes Preventative and corrective action records Incident reports
Appendix B Bibliography
Blakely, Bob, McDermott, Ellen, and Geer, Dan. "Information Security Is Information Risk Management." Paper presented at the 2001 workshop on new security paradigms, Cloudcroft, New Mexico 2001. Bernstein, Peter L. Against the Gods: The Remarkable Story of Risk: John Wiley & Sons, 1996. Calder, Alan. It Governance: Data Security and Bs 7799/ Iso 17799: Kogan Page Ltd, 2002. Humphreys, Edward Implementing the ISO/IEC 27001 Information Security Management System Standard , Artech House Publishers, June 30, 2007 Department of Homeland Security. "The National Strategy to Secure Cyberspace." In : United States Government ;, 2003. ISMS-IUG. International Register of Bs 7799 Accredited Certificates (65) 2003/06/21, 2003 . Available from http://www.xisec.com/Register.htm.
ISO/IEC 17021:2006 Conformity assessment Requirements for bodies providing audit and certification of management systems.
Karapetrovic , Stanislav, and Willborn , Walter. "Connecting Internal Management Systems in Service Organizations." Managing Service Quality 8, no. 4 (1998): 256-71. Karapetrovic , Stanislav, and Willborn , Walter. "Integrated Audit of Management Systems." International Journal of Quality and Reliability Management 15, no. 7 (1998): 694. Karapetrovic, Stanislav, and Jonker, Jan. "Integration of Standardized Management Systems: Searching for a Recipe and Ingredients." Total Quality Management & Business Excellence 14, no. 4 (2003): 451-60. Landry, Michel L. "The Risk Management Process - Part 1." ISSA Journal 2003, no. 10 (2003). Noble, Michael. Organizational Mastery With Integrated Management Systems: Controlling the Dragon. New York, New York: Wiley, 2000. Spinellis, D., S. Kokolakis, and S. Gritzalis. "Security Requirements, Risks and Recommendations for Small Enterprise and Home-Office Environments." Information Management and Computer Security 7, no. 3 (1999): 121-28. Stoneburger, Gary, Goguen, Alice, and Feringa, Alexis. "Risk Management Guide for Information Technology Systems." In : NIST, 2004.