SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
Transitioning to ISO 27001:2013
2

Welcome and Introductions SAI Global
 Provides information services and solutions globally
to:
– Manage risk
– Achieve compliance
– Drive business improvement
 Leading provider of ISO 27001 assurance services in
the region
 Provides training in understanding, implementing and
auditing Information Security Management Systems
3

Introductions CQR
 Largest Australian-owned independent information
security consultancy
 Experts in the design, implementation and operations
of ISMS’ based on ISO 27001
 Our specialists have assisted in excess of 20
organisations globally through the certification
process
 CQR has been certified to ISO 27001 for almost 9
years
4

Learning Outcomes

 At the end of the session, you will have:
– An understanding of the differences between
the 2005 and 2013 version of ISO/IEC 27001
– Information to allow you to start to plan the
necessary transition activities
5

Agenda
 Brief history of ISO 27001 and 27002
 Drivers for updating the standard
 Changes to the mandatory clauses
– 2005 – Clauses 4 to 8
– 2013 - Clauses 4 to 10
 Key changes to Annex A
 Transition Activities
 Certification considerations
 Q&A
6

The evolution of ISO 27001 revisited
7

ISO 27001 Revisited

 Developed from BS 7799 Part 2
 First released in 2005 as the core standard in
the 27000 family for information security
 Supporting standard ISO 27002 renamed from
ISO 17799 in 2007
 Both standards updated and published in 2013
 ISO 27001 is the “auditable” and “certifiable”
standard
8

Drivers for the update
9

Why the update?

 Experience over the last 2 decades with a large
number of organisations globally
 The changing landscape (outsourcing, cloud
etc.)
 To align the standard with key principles within
the ISO 31000 risk management standard
10

Why the update?

 Driven by the need to align the structure of ALL
ISO management systems standards
– Shared language for all non-specific
components of the management systems
– Conformance with Annex SL requirements
11

Conceptual Differences
12

Concepts and Context differences

 No formal PDCA model any more as long as
continual improvement occurs
 Shift to move support of the ISMS to the
executive management level (“top
management”)
 Management of risks has higher focus than
control effectiveness
 Now have the concept of “risk owner”
13

Changes to the mandatory clauses
14

Mandatory Clauses – 2005 version

 Clauses 0-3 provide background and definitions
 Clauses 4-8 provide the mandatory
requirements for the ISMS
 Clause 4 – Information security management
system
 Clause 5 – Management responsibility
 Clause 6 – Internal ISMS audits
 Clause 7 – Management review of the ISMS
 Clause 8 – ISMS Improvement
15

Mandatory Clauses – 2013 version
 Clauses 0-3 provide background
 Clauses 4-10 provide the mandatory
requirements for the ISMS
 Clause 4 – Context of the organisation
 Clause 5 – Leadership
 Clause 6 – Planning
 Clause 7 – Support
 Clause 8 – Operation
 Clause 9 – Performance evaluation
 Clause 10 - Improvement
16

Key differences
 Need to document motivation and context for
operating an ISMS
 Requirement to consider interfaces and
dependencies with other parties
 Need to include external risk sources and
outsourced functions
 Must be included in scope
 The ISMS Policy has been removed and now only
refers to an Information Security Policy
17

Key Differences

 Alignment of risk approach to ISO 31000 rather than
the current version of ISO 27005
 Don’t need to identify assets, threats and
vulnerabilities before risk identification
 Risk sections now discuss “consequences” not
“impact”
 Formally requires risk owners to approve the risk
treatment plans
18

Key Differences

 Preventive action as a concept disappears
– Replaced by “risks and opportunities”
 Determination of controls is now part of the risk
assessment, not a separate selection process from
Annex A
 However, still need to validate selected controls
against Annex A to verify no necessary controls have
been omitted
 A Statement of Applicability is still required
19

Key Differences – Mandatory Procedures

 2005 had 5 mandatory procedures
 2013 has removed the explicit requirement
 Still required to control documented information
– Including supporting records
 Internal Audit activity is still required but no longer
requires a formal procedure
 Non-conformity and corrective action must still occur
 Explicit preventive action requirement is removed
20

Key Differences – Mandatory Requirements

 Management Review changes
– Must occur at planned intervals (used to be at
least annually)
– No longer defines specific precise inputs and
outputs but provides a list of topics that need to
be considered
 Internal Audit
– Statement that auditors shall not audit their won
work has been removed
– However, must be objective and impartial
21

Annexure A Changes
22

Annex A

 2005 had 133 controls in 11 sections
 2013 has 114 controls in 14 sections
 Some controls have been removed completely
– E.g. A.12.5.4 Information leakage
–
A.11.5.6 Limitation of connection time
 Others are combined – E.g. malicious and mobile
code is now Malware (new A.12.2.1)
 Some new controls added
 My view – the new Annex A is a simplified set of
controls that are more easily understood
23

Annex A

 Have split Communications and Operations
Management (A.10) into two
– A.12 Operations security
– A.13 Communications security
 Also now have a separate section (A.10) for
Cryptography
 Business Continuity section has undergone
significant change, focusing on embedding
information security into the organisation’s BCMS
– This section also addresses redundant facilities
24

Other Changes
25

Annexures B and C (2005)

 Annex B contained the cross reference to the OECD
principles
 Also referred to the PDCA model which has been
dropped
 There is no equivalent annexure in the 2013 version
 Annex C provided a cross-reference between 27001
and other standards
 Given the revision of the other standards this section
has also been removed with no replacement
26

Transition Activities
27

Transition Activities

 Assumption – you have an ISMS in place based on
the ISO/IEC 27001:2005 standard
– Equivalent to AS/NZS ISO/IEC 27001:2006
 Assumption – Goal is to keep changes to a
minimum
28

Transition Activities

 Where to start?
– Is a gap analysis worthwhile?
– Yes, level will depend on how close you are to
your system
 You need to have some sort of transition plan and
a gap analysis may help identify tasks
 Once you have identified key activities, add them
to your current system as improvement
opportunities
29

Transition Activities

 Document all “interested parties”
– Internal and external
 Re-visit your Scope statement
– Make sure you capture the interfaces with third
parties and the security requirements around
these interfaces
30

Transition Activities

 For Management, specifically allocate responsibility
for
– Ensuring the ISMS conforms with the standard
– Reporting on the performance of the ISMS to
top management
 Capture business objectives and understand how
your ISMS can assist in delivering against these
(align business and security objectives)
31

Transition Activities

 Review your ISMS policy (in 2013, called the
Information Security Policy) and simplify if there is
value in doing so.
– You can leave it unchanged if it’s working!
– Can add the roles and responsibilities previously
discussed in this document if you wish
32

Transition Activities

 Review your risk management procedure
– Can simplify by removing the asset-threatvulnerability approach
– Ensure that you have a process to identify and
record “risk owners”
 Revisit your risk assessments and get approval of
treatments from the risk owners
– Still need a record of acceptance of residual risk
33

Transition Activities

 Revisit your Statement of Applicability (SoA)
– Map risks against new Annex A controls
– Just because a control has disappeared from
Annex A does not mean you should remove it
– If it still manages a risk, it should still appear in
your SoA
 Check references in the rest of your system to
controls within the SoA (risk register etc.)
34

Transition Activities

 Review the required documentation
– Do you want to keep your versions of the old
mandatory procedures
– What documents can be retired?
– What new documents are needed?
– New documents may be required based on any
new controls selected in your Statement of
Applicability
35

Transition Activities

 Potential new documents
– Information security objectives (Not Annex A
related)
– A.14.2.1 Secure Development Policy
– A.14.2.5 Secure Systems Engineering principles
– A.15.1.1 InfoSec Policy for Supplier Relationships
– A.16.1.7 a procedure for evidence management
36

Transition Activities

 Revisit your metrics and measures
– New version has more focus on metrics and
measures
– Need to identify what your metrics will be and
how you will measure the performance of the
ISMS
 Only measure that which provides value
(information on the performance of the ISMS)
37

Transition Activities

 Need to ensure that you define
– How things will be measured
– Who monitors/measures
– When will it be done
– Who is going to look at the results
– When will this happen
38

Additional Workshops

 Melbourne – 9th December
 Sydney – 10th December

 Further information
www.saiglobal.com or
http://training.saiglobal.com/tis/promotion.aspx?id=a0
c20000005bAeQ
39

Certification Considerations
40

Certification

 For new certifications, can choose to certify to the
2005 version until Sept 2014
 For organisations currently certified to the 2005
version, you have until Sept 2015 to transition your
system
 Don’t leave it until the last minute, start making the
necessary changes as soon as you can
41

Any questions?
42

Thanks for your attention
Enjoy you day!
david.simpson@cqr.com

Contenu connexe

Tendances

What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMSBusiness Beam
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsUppala Anand
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTGaffri Johnson
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListSriramITISConsultant
 
PECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by KinvergPECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by KinvergKinverg
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr WafulaDiscover JKUAT
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)AHM Pervej Kabir
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001Imran Ahmed
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My OrganisationVigilant Software
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA
 
Iso 27001 certification
Iso 27001 certificationIso 27001 certification
Iso 27001 certificationramya119
 

Tendances (20)

ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
Popular Pitfalls In Isms Compliance
Popular Pitfalls In Isms CompliancePopular Pitfalls In Isms Compliance
Popular Pitfalls In Isms Compliance
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_List
 
Iso 27001 2013
Iso 27001 2013Iso 27001 2013
Iso 27001 2013
 
PECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by KinvergPECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by Kinverg
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
 
ISO 27001:2013 - A transition guide
ISO 27001:2013 - A transition guideISO 27001:2013 - A transition guide
ISO 27001:2013 - A transition guide
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
 
Isms
IsmsIsms
Isms
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
 
Iso 27001 10_apr_2006
Iso 27001 10_apr_2006Iso 27001 10_apr_2006
Iso 27001 10_apr_2006
 
Iso 27001 certification
Iso 27001 certificationIso 27001 certification
Iso 27001 certification
 

En vedette

Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016Leon Blum
 
Continuous Improvement in Government Conference
Continuous Improvement in Government ConferenceContinuous Improvement in Government Conference
Continuous Improvement in Government ConferenceSAIGlobalAssurance
 
AS9100C Most Common NCRs - Preview
AS9100C Most Common NCRs - PreviewAS9100C Most Common NCRs - Preview
AS9100C Most Common NCRs - PreviewSAIGlobalAssurance
 
Food Safety Legislation - John Fallon
Food Safety Legislation - John FallonFood Safety Legislation - John Fallon
Food Safety Legislation - John FallonSAIGlobalAssurance
 
Developing Effective Checklists to Support the Internal Audit Function - Webinar
Developing Effective Checklists to Support the Internal Audit Function - WebinarDeveloping Effective Checklists to Support the Internal Audit Function - Webinar
Developing Effective Checklists to Support the Internal Audit Function - WebinarSAIGlobalAssurance
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Seafood Certification Programs
Seafood Certification ProgramsSeafood Certification Programs
Seafood Certification ProgramsSAIGlobalAssurance
 
WEBINAR: Transitioning to ISO/IEC 27001: 2013
WEBINAR: Transitioning to ISO/IEC 27001: 2013WEBINAR: Transitioning to ISO/IEC 27001: 2013
WEBINAR: Transitioning to ISO/IEC 27001: 2013SAIGlobalAssurance
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewNaresh Rao
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overviewJulia Urbina-Pineda
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002pgpmikey
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...iFour Consultancy
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Validation and Verification of HACCP Plans - Webinar Presentation
Validation and Verification of HACCP Plans - Webinar PresentationValidation and Verification of HACCP Plans - Webinar Presentation
Validation and Verification of HACCP Plans - Webinar PresentationSAIGlobalAssurance
 
Verification Planning of Food Safety System
Verification Planning of Food Safety SystemVerification Planning of Food Safety System
Verification Planning of Food Safety SystemPECB
 

En vedette (20)

Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016
 
Lean Event 2013
Lean Event 2013Lean Event 2013
Lean Event 2013
 
Episode 5: Slipstream
Episode 5: SlipstreamEpisode 5: Slipstream
Episode 5: Slipstream
 
Continuous Improvement in Government Conference
Continuous Improvement in Government ConferenceContinuous Improvement in Government Conference
Continuous Improvement in Government Conference
 
AS9100C Most Common NCRs - Preview
AS9100C Most Common NCRs - PreviewAS9100C Most Common NCRs - Preview
AS9100C Most Common NCRs - Preview
 
Food Safety Legislation - John Fallon
Food Safety Legislation - John FallonFood Safety Legislation - John Fallon
Food Safety Legislation - John Fallon
 
Developing Effective Checklists to Support the Internal Audit Function - Webinar
Developing Effective Checklists to Support the Internal Audit Function - WebinarDeveloping Effective Checklists to Support the Internal Audit Function - Webinar
Developing Effective Checklists to Support the Internal Audit Function - Webinar
 
SAI Global's Lean Capability
SAI Global's Lean CapabilitySAI Global's Lean Capability
SAI Global's Lean Capability
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
пр серия стандартов Iso 27k
пр серия стандартов Iso 27kпр серия стандартов Iso 27k
пр серия стандартов Iso 27k
 
Seafood Certification Programs
Seafood Certification ProgramsSeafood Certification Programs
Seafood Certification Programs
 
WEBINAR: Transitioning to ISO/IEC 27001: 2013
WEBINAR: Transitioning to ISO/IEC 27001: 2013WEBINAR: Transitioning to ISO/IEC 27001: 2013
WEBINAR: Transitioning to ISO/IEC 27001: 2013
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Validation and Verification of HACCP Plans - Webinar Presentation
Validation and Verification of HACCP Plans - Webinar PresentationValidation and Verification of HACCP Plans - Webinar Presentation
Validation and Verification of HACCP Plans - Webinar Presentation
 
Verification Planning of Food Safety System
Verification Planning of Food Safety SystemVerification Planning of Food Safety System
Verification Planning of Food Safety System
 

Similaire à Transitioning to the Updated ISO 27001:2013 Standard

ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
ISO 9001-2015 Revision Training Presentation
ISO 9001-2015 Revision Training PresentationISO 9001-2015 Revision Training Presentation
ISO 9001-2015 Revision Training PresentationDQS Inc.
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças Fernando Palma
 
ISO 9001:2015 Revision Overview: part 2
ISO 9001:2015 Revision Overview: part 2ISO 9001:2015 Revision Overview: part 2
ISO 9001:2015 Revision Overview: part 2DQS Inc.
 
UL DQS India News Letter - iSeeek jun_2014
UL DQS India News Letter - iSeeek jun_2014UL DQS India News Letter - iSeeek jun_2014
UL DQS India News Letter - iSeeek jun_2014DQS India
 
NQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA
 
Presentation Revision Standards
Presentation Revision StandardsPresentation Revision Standards
Presentation Revision StandardsDQS India
 
Integrating sms and isms
Integrating sms and ismsIntegrating sms and isms
Integrating sms and ismsSeptafiansyah P
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?PECB
 
ISO 9001:2015 webinar Part 3 - UL DQS Inc
ISO 9001:2015 webinar Part 3 - UL DQS IncISO 9001:2015 webinar Part 3 - UL DQS Inc
ISO 9001:2015 webinar Part 3 - UL DQS IncDQS Inc.
 
Iso 2008 vs 2015
Iso 2008 vs 2015Iso 2008 vs 2015
Iso 2008 vs 2015Haya Haroon
 
Compliance Framework
Compliance FrameworkCompliance Framework
Compliance Frameworkbarnetdh
 
Iso 27001 transition to 2013 03202014
Iso 27001 transition to 2013   03202014Iso 27001 transition to 2013   03202014
Iso 27001 transition to 2013 03202014DQS Inc.
 

Similaire à Transitioning to the Updated ISO 27001:2013 Standard (20)

ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
ISO 9001-2015 Revision Training Presentation
ISO 9001-2015 Revision Training PresentationISO 9001-2015 Revision Training Presentation
ISO 9001-2015 Revision Training Presentation
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças
 
314
314314
314
 
Cobit5
Cobit5Cobit5
Cobit5
 
ISO 9001:2015 Revision Overview: part 2
ISO 9001:2015 Revision Overview: part 2ISO 9001:2015 Revision Overview: part 2
ISO 9001:2015 Revision Overview: part 2
 
UL DQS India News Letter - iSeeek jun_2014
UL DQS India News Letter - iSeeek jun_2014UL DQS India News Letter - iSeeek jun_2014
UL DQS India News Letter - iSeeek jun_2014
 
NQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap Guide
 
Presentation Revision Standards
Presentation Revision StandardsPresentation Revision Standards
Presentation Revision Standards
 
Integrating sms and isms
Integrating sms and ismsIntegrating sms and isms
Integrating sms and isms
 
New ISO 20000-1:2018 Changes, Implementation Steps
New ISO 20000-1:2018 Changes, Implementation StepsNew ISO 20000-1:2018 Changes, Implementation Steps
New ISO 20000-1:2018 Changes, Implementation Steps
 
9001-2015
9001-20159001-2015
9001-2015
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
 
Khas bank isms 3 s
Khas bank isms 3 sKhas bank isms 3 s
Khas bank isms 3 s
 
ISO 9001:2015 webinar Part 3 - UL DQS Inc
ISO 9001:2015 webinar Part 3 - UL DQS IncISO 9001:2015 webinar Part 3 - UL DQS Inc
ISO 9001:2015 webinar Part 3 - UL DQS Inc
 
Iso 2008 vs 2015
Iso 2008 vs 2015Iso 2008 vs 2015
Iso 2008 vs 2015
 
27001 2013 iso geek
27001 2013 iso geek27001 2013 iso geek
27001 2013 iso geek
 
Compliance Framework
Compliance FrameworkCompliance Framework
Compliance Framework
 
Iso 27001 transition to 2013 03202014
Iso 27001 transition to 2013   03202014Iso 27001 transition to 2013   03202014
Iso 27001 transition to 2013 03202014
 

Dernier

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Dernier (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Transitioning to the Updated ISO 27001:2013 Standard

  • 1. Transitioning to ISO 27001:2013
  • 2. 2 Welcome and Introductions SAI Global  Provides information services and solutions globally to: – Manage risk – Achieve compliance – Drive business improvement  Leading provider of ISO 27001 assurance services in the region  Provides training in understanding, implementing and auditing Information Security Management Systems
  • 3. 3 Introductions CQR  Largest Australian-owned independent information security consultancy  Experts in the design, implementation and operations of ISMS’ based on ISO 27001  Our specialists have assisted in excess of 20 organisations globally through the certification process  CQR has been certified to ISO 27001 for almost 9 years
  • 4. 4 Learning Outcomes  At the end of the session, you will have: – An understanding of the differences between the 2005 and 2013 version of ISO/IEC 27001 – Information to allow you to start to plan the necessary transition activities
  • 5. 5 Agenda  Brief history of ISO 27001 and 27002  Drivers for updating the standard  Changes to the mandatory clauses – 2005 – Clauses 4 to 8 – 2013 - Clauses 4 to 10  Key changes to Annex A  Transition Activities  Certification considerations  Q&A
  • 6. 6 The evolution of ISO 27001 revisited
  • 7. 7 ISO 27001 Revisited  Developed from BS 7799 Part 2  First released in 2005 as the core standard in the 27000 family for information security  Supporting standard ISO 27002 renamed from ISO 17799 in 2007  Both standards updated and published in 2013  ISO 27001 is the “auditable” and “certifiable” standard
  • 9. 9 Why the update?  Experience over the last 2 decades with a large number of organisations globally  The changing landscape (outsourcing, cloud etc.)  To align the standard with key principles within the ISO 31000 risk management standard
  • 10. 10 Why the update?  Driven by the need to align the structure of ALL ISO management systems standards – Shared language for all non-specific components of the management systems – Conformance with Annex SL requirements
  • 12. 12 Concepts and Context differences  No formal PDCA model any more as long as continual improvement occurs  Shift to move support of the ISMS to the executive management level (“top management”)  Management of risks has higher focus than control effectiveness  Now have the concept of “risk owner”
  • 13. 13 Changes to the mandatory clauses
  • 14. 14 Mandatory Clauses – 2005 version  Clauses 0-3 provide background and definitions  Clauses 4-8 provide the mandatory requirements for the ISMS  Clause 4 – Information security management system  Clause 5 – Management responsibility  Clause 6 – Internal ISMS audits  Clause 7 – Management review of the ISMS  Clause 8 – ISMS Improvement
  • 15. 15 Mandatory Clauses – 2013 version  Clauses 0-3 provide background  Clauses 4-10 provide the mandatory requirements for the ISMS  Clause 4 – Context of the organisation  Clause 5 – Leadership  Clause 6 – Planning  Clause 7 – Support  Clause 8 – Operation  Clause 9 – Performance evaluation  Clause 10 - Improvement
  • 16. 16 Key differences  Need to document motivation and context for operating an ISMS  Requirement to consider interfaces and dependencies with other parties  Need to include external risk sources and outsourced functions  Must be included in scope  The ISMS Policy has been removed and now only refers to an Information Security Policy
  • 17. 17 Key Differences  Alignment of risk approach to ISO 31000 rather than the current version of ISO 27005  Don’t need to identify assets, threats and vulnerabilities before risk identification  Risk sections now discuss “consequences” not “impact”  Formally requires risk owners to approve the risk treatment plans
  • 18. 18 Key Differences  Preventive action as a concept disappears – Replaced by “risks and opportunities”  Determination of controls is now part of the risk assessment, not a separate selection process from Annex A  However, still need to validate selected controls against Annex A to verify no necessary controls have been omitted  A Statement of Applicability is still required
  • 19. 19 Key Differences – Mandatory Procedures  2005 had 5 mandatory procedures  2013 has removed the explicit requirement  Still required to control documented information – Including supporting records  Internal Audit activity is still required but no longer requires a formal procedure  Non-conformity and corrective action must still occur  Explicit preventive action requirement is removed
  • 20. 20 Key Differences – Mandatory Requirements  Management Review changes – Must occur at planned intervals (used to be at least annually) – No longer defines specific precise inputs and outputs but provides a list of topics that need to be considered  Internal Audit – Statement that auditors shall not audit their won work has been removed – However, must be objective and impartial
  • 22. 22 Annex A  2005 had 133 controls in 11 sections  2013 has 114 controls in 14 sections  Some controls have been removed completely – E.g. A.12.5.4 Information leakage – A.11.5.6 Limitation of connection time  Others are combined – E.g. malicious and mobile code is now Malware (new A.12.2.1)  Some new controls added  My view – the new Annex A is a simplified set of controls that are more easily understood
  • 23. 23 Annex A  Have split Communications and Operations Management (A.10) into two – A.12 Operations security – A.13 Communications security  Also now have a separate section (A.10) for Cryptography  Business Continuity section has undergone significant change, focusing on embedding information security into the organisation’s BCMS – This section also addresses redundant facilities
  • 25. 25 Annexures B and C (2005)  Annex B contained the cross reference to the OECD principles  Also referred to the PDCA model which has been dropped  There is no equivalent annexure in the 2013 version  Annex C provided a cross-reference between 27001 and other standards  Given the revision of the other standards this section has also been removed with no replacement
  • 27. 27 Transition Activities  Assumption – you have an ISMS in place based on the ISO/IEC 27001:2005 standard – Equivalent to AS/NZS ISO/IEC 27001:2006  Assumption – Goal is to keep changes to a minimum
  • 28. 28 Transition Activities  Where to start? – Is a gap analysis worthwhile? – Yes, level will depend on how close you are to your system  You need to have some sort of transition plan and a gap analysis may help identify tasks  Once you have identified key activities, add them to your current system as improvement opportunities
  • 29. 29 Transition Activities  Document all “interested parties” – Internal and external  Re-visit your Scope statement – Make sure you capture the interfaces with third parties and the security requirements around these interfaces
  • 30. 30 Transition Activities  For Management, specifically allocate responsibility for – Ensuring the ISMS conforms with the standard – Reporting on the performance of the ISMS to top management  Capture business objectives and understand how your ISMS can assist in delivering against these (align business and security objectives)
  • 31. 31 Transition Activities  Review your ISMS policy (in 2013, called the Information Security Policy) and simplify if there is value in doing so. – You can leave it unchanged if it’s working! – Can add the roles and responsibilities previously discussed in this document if you wish
  • 32. 32 Transition Activities  Review your risk management procedure – Can simplify by removing the asset-threatvulnerability approach – Ensure that you have a process to identify and record “risk owners”  Revisit your risk assessments and get approval of treatments from the risk owners – Still need a record of acceptance of residual risk
  • 33. 33 Transition Activities  Revisit your Statement of Applicability (SoA) – Map risks against new Annex A controls – Just because a control has disappeared from Annex A does not mean you should remove it – If it still manages a risk, it should still appear in your SoA  Check references in the rest of your system to controls within the SoA (risk register etc.)
  • 34. 34 Transition Activities  Review the required documentation – Do you want to keep your versions of the old mandatory procedures – What documents can be retired? – What new documents are needed? – New documents may be required based on any new controls selected in your Statement of Applicability
  • 35. 35 Transition Activities  Potential new documents – Information security objectives (Not Annex A related) – A.14.2.1 Secure Development Policy – A.14.2.5 Secure Systems Engineering principles – A.15.1.1 InfoSec Policy for Supplier Relationships – A.16.1.7 a procedure for evidence management
  • 36. 36 Transition Activities  Revisit your metrics and measures – New version has more focus on metrics and measures – Need to identify what your metrics will be and how you will measure the performance of the ISMS  Only measure that which provides value (information on the performance of the ISMS)
  • 37. 37 Transition Activities  Need to ensure that you define – How things will be measured – Who monitors/measures – When will it be done – Who is going to look at the results – When will this happen
  • 38. 38 Additional Workshops  Melbourne – 9th December  Sydney – 10th December  Further information www.saiglobal.com or http://training.saiglobal.com/tis/promotion.aspx?id=a0 c20000005bAeQ
  • 40. 40 Certification  For new certifications, can choose to certify to the 2005 version until Sept 2014  For organisations currently certified to the 2005 version, you have until Sept 2015 to transition your system  Don’t leave it until the last minute, start making the necessary changes as soon as you can
  • 42. 42 Thanks for your attention Enjoy you day! david.simpson@cqr.com