Iso 27001 Awareness
Iso 27001 Awareness
Iso 27001 Awareness
– Concepts, Policy,
Organisation
Narmadha R, Director,
O/o. DGCA, Chennai
1
Isg.techmahindra.com
What is Information Security?
Confidential 2
Isg.techmahindra.com
Information types
Confidential 3
Isg.techmahindra.com
Basic components
Confidentialit Ensuring that information is accessible only
y to those authorised to have access.
Confidentiality Availability
Confidential 5
Isg.techmahindra.com
Managing information boundaries
Confidential 6
Isg.techmahindra.com
Context for Info Security
Management
The Public
Internal customers
Mgmt.
Integrity Confidentiality
Employees Litigation
Risk
Availability
Stakeholders Internal
Audit
Confidential 7
Isg.techmahindra.com
What is ISO 27001?
Establish the
ISMS
Do Act
Monitor and
Information review the ISMS
Managed
security information
requirements
and expectations Check security
Confidential 9
Isg.techmahindra.com
Important Areas of Concern
ISO27001
1. Security policy
2. Organization of information security
3. Asset management
4. Human resources security
5. Physical and environmental security
6. Communications and operations management
7. Access control
8. Information systems acquisition, development
and maintenance
9. Information security incident management
10. Business continuity management
11. Compliance
Confidential 10
Isg.techmahindra.com
ISO27001 Framework: Components
Security
SecurityPolicy
Policy
Incident Compliance
Security
Security
Compliance Organisation
Management Organisation
Business
BusinessContinuity
Continuity Asset
AssetClassification
Classification
Management
Management &&Control
Control
Information
Security
Management
System
System System Personnel
PersonnelSecurity/
Security/
Development
Development HR Security
HR Security
Physical
Physicaland
and
Access
AccessControl
Control
Communications Environmental
Environmental
Communications
&&Operations
Operations
Confidential 11
Isg.techmahindra.com
1. Security Policy
• Objective:
• Information security policy.
• Covers:
• Information security policy document
• Review of Informational Security Policy
Confidential 12
Isg.techmahindra.com
Examples of various IS Security
policies
Confidential 13
Isg.techmahindra.com
2. Organization of information
security
• Objective:
• Internal Organization
• External Parties
• Covers:
• Allocation of information security responsibilities
• Authorization process for information processing facilities
• Management commitment to information security
• Information security coordination
• Confidentiality agreements
• Contact with authorities
• Independent review of information security
• Identification of risks related to external parties
• Addressing security when dealing with customers
• Addressing Security in third party agreements
Confidential 14
Isg.techmahindra.com
2. Organization of information security -
Example
Management Chaired by
Security Forum CEO / COO
eSecurity Group
• Specialised services
(e.g. Penetration
testing)
Chief Information
Security Officer
QMG
• Audits and reviews
Location Security Specialised staff:
• Integration security
Managers • Risk Assessment
• Security Incident • processes in BMS
BCP/DRP
handling • Application Security
• MIS and dash • Security audits and
boards reviews TIM
• Security • Security Training & • IT Operations
Coordination Awareness • Network Security
• Monitoring
• Covers:
• Inventory of assets
• Ownership of assets
• Acceptable use of assets
• Classification guidelines
• Information labelling and handling
Confidential 16
Isg.techmahindra.com
Information Asset - Classification
Confidential 17
Isg.techmahindra.com
4. Human Resource Security
• Objective:
• Prior to employment
• During employment
• Termination or change of employment
• Covers:
• Roles and responsibilities
• Screening
• Terms and conditions of employment
• Management responsibilities
• Information security awareness, education and training
• Disciplinary process
• Termination responsibilities
• Return of assets
• Removal of access rights
Confidential 18
Isg.techmahindra.com
5. Physical and Environmental
Security
• Objective:
• Secure Areas
• Equipment Security
• Covers:
• Physical Security Perimeter
• Physical entry Controls
• Securing Offices, rooms and facilities
• Protecting against external and environmental threats
• Working in Secure Areas
• Public access delivery and loading areas
• Cabling Security
• Equipment Maintenance
• Securing of equipment off-premises
• Secure disposal or re-use of equipment
• Removal of property
Confidential 19
Isg.techmahindra.com
6. Communications & Operations
Management
• Objective:
• Operational Procedures and responsibilities
• Third party service delivery management
• System planning and acceptance
• Protection against malicious and mobile code
• Backup
• Network Security Management
• Media handling
• Exchange of Information
• Electronic Commerce Services
• Monitoring
• Covers:
• Documented Operating procedures
• Change management
• Segregation of duties
Confidential 20
Isg.techmahindra.com
6. Communications & Operations Management
(contd..)
• Separation of development, test and operational facilities
• Service delivery
• Monitoring and review of third party services
• Managing changes to third party services
• Capacity Management
• Controls against malicious code
• Information backup
• Network Controls
• Security of network services
• Management of removable media
• Disposal of Media
• Information handling procedures
• Security of system documentation
• Information exchange policies and procedures
• Exchange agreements
Confidential 21
Isg.techmahindra.com
6. Communications & Operations Management
(contd..)
• Electronic Messaging
• Business information systems
• On-Line Transactions
• Publicly available information
• Audit logging
• Monitoring system use
• Protection of log information
• Administrator and operator
logs
• Fault logging
• Clock synchronisation
Confidential 22
Isg.techmahindra.com
7. Access Controls
• Objective:
• Business Requirement for Access Control
• User Access Management
• User Responsibilities
• Network Access Control
• Operating system access control
• Application and Information Access Control
• Mobile Computing and teleworking
• Covers:
• Access Control Policy
• User Registration
• Privilege Management
• User Password Management
• Review of user access rights
• Password use
Confidential 23
Isg.techmahindra.com
7. Access Controls (contd..)
• Unattended user equipment
• Clear desk and clear screen policy
• Policy on use of network services
• User authentication for external connections
• Equipment identification in networks
• Remote diagnostic and configuration port protection
• Segregation in networks
• Network connection control
• Network routing control
• Secure log-on procedures
• User identification and authentication
• Password management system
• Use of system utilities
• Session time-out
• Limitation of connection time
• Information access restriction
• Sensitive system isolation
• Mobile computing and communications
• Teleworking
Confidential 24
Isg.techmahindra.com
8. Information systems acquisition, development and maintenance
• Objective:
• Security requirements of information systems
• Correct processing in applications
• Cryptographic controls
• Security of system files
• Security in development and support processes
• Technical Vulnerability Management
• Covers:
• Security requirements analysis and specification
• Input data validation
• Control of internal processing
• Message integrity
• Output data validation
• Policy on use of cryptographic controls
• Key management
• Control of operational software
• Protection of system test data
Confidential 25
Isg.techmahindra.com
8. Information systems acquisition, development and maintenance (contd)
Confidential 26
Isg.techmahindra.com
9. Information Security Incident
Management
• Objective:
• Reporting information security events and weaknesses
• Management of information security incidents and improvements
• Covers:
• Reporting information security events
• Reporting security weaknesses
• Responsibilities and procedures
• Learning from information security incidents
• Collection of evidence
Confidential 27
Isg.techmahindra.com
10. Business Continuity
Management
• Objective:
• Information security aspects of business continuity management
• Covers:
• Including information security in the business continuity
management process
• Business continuity and risk assessment
• Developing and implementing continuity plans including
information security
• Business continuity planning framework
• Testing, maintaining and re-assessing business continuity plans
Confidential 28
Isg.techmahindra.com
11. Compliance
• Objective
• Compliance with legal requirements
• Compliance with security policies and standards, and technical compliance
• Information Systems audit considerations
• Covers:
• Identification of applicable legislation
• Intellectual property rights (IPR)
• Protection of organizational records
• Data protection and privacy of personal information
• Prevention of misuse of information processing facilities
• Regulation of cryptographic controls
• Compliance with security policies and standards
• Technical compliance checking
• Information systems audit controls
• Protection of information system audit tools
Confidential 29
Isg.techmahindra.com
Your Questions please?
Thank You…
Thank You
30
Isg.techmahindra.com