SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
Transitioning to ISO 27001:2013
2

Welcome and Introductions SAI Global
 Provides information services and solutions globally
to:
– Manage risk
– Achieve compliance
– Drive business improvement
 Leading provider of ISO 27001 assurance services in
the region
 Provides training in understanding, implementing and
auditing Information Security Management Systems
3

Introductions CQR
 Largest Australian-owned independent information
security consultancy
 Experts in the design, implementation and operations
of ISMS’ based on ISO 27001
 Our specialists have assisted in excess of 20
organisations globally through the certification
process
 CQR has been certified to ISO 27001 for almost 9
years
4

Learning Outcomes

 At the end of the session, you will have:
– An understanding of the differences between
the 2005 and 2013 version of ISO/IEC 27001
– Information to allow you to start to plan the
necessary transition activities
5

Agenda
 Brief history of ISO 27001 and 27002
 Drivers for updating the standard
 Changes to the mandatory clauses
– 2005 – Clauses 4 to 8
– 2013 - Clauses 4 to 10
 Key changes to Annex A
 Transition Activities
 Certification considerations
 Q&A
6

The evolution of ISO 27001 revisited
7

ISO 27001 Revisited

 Developed from BS 7799 Part 2
 First released in 2005 as the core standard in
the 27000 family for information security
 Supporting standard ISO 27002 renamed from
ISO 17799 in 2007
 Both standards updated and published in 2013
 ISO 27001 is the “auditable” and “certifiable”
standard
8

Drivers for the update
9

Why the update?

 Experience over the last 2 decades with a large
number of organisations globally
 The changing landscape (outsourcing, cloud
etc.)
 To align the standard with key principles within
the ISO 31000 risk management standard
10

Why the update?

 Driven by the need to align the structure of ALL
ISO management systems standards
– Shared language for all non-specific
components of the management systems
– Conformance with Annex SL requirements
11

Conceptual Differences
12

Concepts and Context differences

 No formal PDCA model any more as long as
continual improvement occurs
 Shift to move support of the ISMS to the
executive management level (“top
management”)
 Management of risks has higher focus than
control effectiveness
 Now have the concept of “risk owner”
13

Changes to the mandatory clauses
14

Mandatory Clauses – 2005 version

 Clauses 0-3 provide background and definitions
 Clauses 4-8 provide the mandatory
requirements for the ISMS
 Clause 4 – Information security management
system
 Clause 5 – Management responsibility
 Clause 6 – Internal ISMS audits
 Clause 7 – Management review of the ISMS
 Clause 8 – ISMS Improvement
15

Mandatory Clauses – 2013 version
 Clauses 0-3 provide background
 Clauses 4-10 provide the mandatory
requirements for the ISMS
 Clause 4 – Context of the organisation
 Clause 5 – Leadership
 Clause 6 – Planning
 Clause 7 – Support
 Clause 8 – Operation
 Clause 9 – Performance evaluation
 Clause 10 - Improvement
16

Key differences
 Need to document motivation and context for
operating an ISMS
 Requirement to consider interfaces and
dependencies with other parties
 Need to include external risk sources and
outsourced functions
 Must be included in scope
 The ISMS Policy has been removed and now only
refers to an Information Security Policy
17

Key Differences

 Alignment of risk approach to ISO 31000 rather than
the current version of ISO 27005
 Don’t need to identify assets, threats and
vulnerabilities before risk identification
 Risk sections now discuss “consequences” not
“impact”
 Formally requires risk owners to approve the risk
treatment plans
18

Key Differences

 Preventive action as a concept disappears
– Replaced by “risks and opportunities”
 Determination of controls is now part of the risk
assessment, not a separate selection process from
Annex A
 However, still need to validate selected controls
against Annex A to verify no necessary controls have
been omitted
 A Statement of Applicability is still required
19

Key Differences – Mandatory Procedures

 2005 had 5 mandatory procedures
 2013 has removed the explicit requirement
 Still required to control documented information
– Including supporting records
 Internal Audit activity is still required but no longer
requires a formal procedure
 Non-conformity and corrective action must still occur
 Explicit preventive action requirement is removed
20

Key Differences – Mandatory Requirements

 Management Review changes
– Must occur at planned intervals (used to be at
least annually)
– No longer defines specific precise inputs and
outputs but provides a list of topics that need to
be considered
 Internal Audit
– Statement that auditors shall not audit their won
work has been removed
– However, must be objective and impartial
21

Annexure A Changes
22

Annex A

 2005 had 133 controls in 11 sections
 2013 has 114 controls in 14 sections
 Some controls have been removed completely
– E.g. A.12.5.4 Information leakage
–
A.11.5.6 Limitation of connection time
 Others are combined – E.g. malicious and mobile
code is now Malware (new A.12.2.1)
 Some new controls added
 My view – the new Annex A is a simplified set of
controls that are more easily understood
23

Annex A

 Have split Communications and Operations
Management (A.10) into two
– A.12 Operations security
– A.13 Communications security
 Also now have a separate section (A.10) for
Cryptography
 Business Continuity section has undergone
significant change, focusing on embedding
information security into the organisation’s BCMS
– This section also addresses redundant facilities
24

Other Changes
25

Annexures B and C (2005)

 Annex B contained the cross reference to the OECD
principles
 Also referred to the PDCA model which has been
dropped
 There is no equivalent annexure in the 2013 version
 Annex C provided a cross-reference between 27001
and other standards
 Given the revision of the other standards this section
has also been removed with no replacement
26

Transition Activities
27

Transition Activities

 Assumption – you have an ISMS in place based on
the ISO/IEC 27001:2005 standard
– Equivalent to AS/NZS ISO/IEC 27001:2006
 Assumption – Goal is to keep changes to a
minimum
28

Transition Activities

 Where to start?
– Is a gap analysis worthwhile?
– Yes, level will depend on how close you are to
your system
 You need to have some sort of transition plan and
a gap analysis may help identify tasks
 Once you have identified key activities, add them
to your current system as improvement
opportunities
29

Transition Activities

 Document all “interested parties”
– Internal and external
 Re-visit your Scope statement
– Make sure you capture the interfaces with third
parties and the security requirements around
these interfaces
30

Transition Activities

 For Management, specifically allocate responsibility
for
– Ensuring the ISMS conforms with the standard
– Reporting on the performance of the ISMS to
top management
 Capture business objectives and understand how
your ISMS can assist in delivering against these
(align business and security objectives)
31

Transition Activities

 Review your ISMS policy (in 2013, called the
Information Security Policy) and simplify if there is
value in doing so.
– You can leave it unchanged if it’s working!
– Can add the roles and responsibilities previously
discussed in this document if you wish
32

Transition Activities

 Review your risk management procedure
– Can simplify by removing the asset-threatvulnerability approach
– Ensure that you have a process to identify and
record “risk owners”
 Revisit your risk assessments and get approval of
treatments from the risk owners
– Still need a record of acceptance of residual risk
33

Transition Activities

 Revisit your Statement of Applicability (SoA)
– Map risks against new Annex A controls
– Just because a control has disappeared from
Annex A does not mean you should remove it
– If it still manages a risk, it should still appear in
your SoA
 Check references in the rest of your system to
controls within the SoA (risk register etc.)
34

Transition Activities

 Review the required documentation
– Do you want to keep your versions of the old
mandatory procedures
– What documents can be retired?
– What new documents are needed?
– New documents may be required based on any
new controls selected in your Statement of
Applicability
35

Transition Activities

 Potential new documents
– Information security objectives (Not Annex A
related)
– A.14.2.1 Secure Development Policy
– A.14.2.5 Secure Systems Engineering principles
– A.15.1.1 InfoSec Policy for Supplier Relationships
– A.16.1.7 a procedure for evidence management
36

Transition Activities

 Revisit your metrics and measures
– New version has more focus on metrics and
measures
– Need to identify what your metrics will be and
how you will measure the performance of the
ISMS
 Only measure that which provides value
(information on the performance of the ISMS)
37

Transition Activities

 Need to ensure that you define
– How things will be measured
– Who monitors/measures
– When will it be done
– Who is going to look at the results
– When will this happen
38

Additional Workshops

 Melbourne – 9th December
 Sydney – 10th December

 Further information
www.saiglobal.com or
http://training.saiglobal.com/tis/promotion.aspx?id=a0
c20000005bAeQ
39

Certification Considerations
40

Certification

 For new certifications, can choose to certify to the
2005 version until Sept 2014
 For organisations currently certified to the 2005
version, you have until Sept 2015 to transition your
system
 Don’t leave it until the last minute, start making the
necessary changes as soon as you can
41

Any questions?
42

Thanks for your attention
Enjoy you day!
david.simpson@cqr.com

Contenu connexe

Tendances

Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentationPranay Kumar
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr WafulaDiscover JKUAT
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTGaffri Johnson
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012Hakem Filiz
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)AHM Pervej Kabir
 
Presentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMPresentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMShantanu Rai
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureUppala Anand
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMSBusiness Beam
 
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?Lars Neupart
 

Tendances (20)

Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
Infosec Audit Lecture_4
Infosec Audit Lecture_4Infosec Audit Lecture_4
Infosec Audit Lecture_4
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
 
Lead Auditor Course on ISO 27001:2013 (ISMS) - IRCA
Lead Auditor Course on ISO 27001:2013 (ISMS) - IRCALead Auditor Course on ISO 27001:2013 (ISMS) - IRCA
Lead Auditor Course on ISO 27001:2013 (ISMS) - IRCA
 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
 
ISO 27001:2013 - A transition guide
ISO 27001:2013 - A transition guideISO 27001:2013 - A transition guide
ISO 27001:2013 - A transition guide
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
 
Presentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMPresentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCM
 
Iso 27001 10_apr_2006
Iso 27001 10_apr_2006Iso 27001 10_apr_2006
Iso 27001 10_apr_2006
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
Isms
IsmsIsms
Isms
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
 

En vedette

AS9100C Most Common NCRs - Preview
AS9100C Most Common NCRs - PreviewAS9100C Most Common NCRs - Preview
AS9100C Most Common NCRs - PreviewSAIGlobalAssurance
 
Continuous Improvement in Government Conference
Continuous Improvement in Government ConferenceContinuous Improvement in Government Conference
Continuous Improvement in Government ConferenceSAIGlobalAssurance
 
Artificial intelligence bsc - iso 27001 information security
Artificial intelligence   bsc - iso 27001 information securityArtificial intelligence   bsc - iso 27001 information security
Artificial intelligence bsc - iso 27001 information securityUfuk Cebeci
 
Food Safety Legislation - John Fallon
Food Safety Legislation - John FallonFood Safety Legislation - John Fallon
Food Safety Legislation - John FallonSAIGlobalAssurance
 
Developing Effective Checklists to Support the Internal Audit Function - Webinar
Developing Effective Checklists to Support the Internal Audit Function - WebinarDeveloping Effective Checklists to Support the Internal Audit Function - Webinar
Developing Effective Checklists to Support the Internal Audit Function - WebinarSAIGlobalAssurance
 
Seafood Certification Programs
Seafood Certification ProgramsSeafood Certification Programs
Seafood Certification ProgramsSAIGlobalAssurance
 
Guide d'utilisation de l'outil AUDITSec basé sur la nouvelle norme ISO 27002 ...
Guide d'utilisation de l'outil AUDITSec basé sur la nouvelle norme ISO 27002 ...Guide d'utilisation de l'outil AUDITSec basé sur la nouvelle norme ISO 27002 ...
Guide d'utilisation de l'outil AUDITSec basé sur la nouvelle norme ISO 27002 ...Eric Clairvoyant, Adm.A.,T.P., CRISC
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013scttmcvy
 
Perancangan Panduan Keamanan Cyber-Physical Systems (CPS) Nasional
Perancangan Panduan Keamanan Cyber-Physical Systems (CPS) NasionalPerancangan Panduan Keamanan Cyber-Physical Systems (CPS) Nasional
Perancangan Panduan Keamanan Cyber-Physical Systems (CPS) NasionalAries Syamsuddin
 
Poster-An Expert System for Car Failure Diagnosis
Poster-An Expert System for Car Failure DiagnosisPoster-An Expert System for Car Failure Diagnosis
Poster-An Expert System for Car Failure DiagnosisViralkumar Jayswal
 
Validation and Verification of HACCP Plans - Webinar Presentation
Validation and Verification of HACCP Plans - Webinar PresentationValidation and Verification of HACCP Plans - Webinar Presentation
Validation and Verification of HACCP Plans - Webinar PresentationSAIGlobalAssurance
 
Verification Planning of Food Safety System
Verification Planning of Food Safety SystemVerification Planning of Food Safety System
Verification Planning of Food Safety SystemPECB
 

En vedette (20)

AS9100C Most Common NCRs - Preview
AS9100C Most Common NCRs - PreviewAS9100C Most Common NCRs - Preview
AS9100C Most Common NCRs - Preview
 
Episode 5: Slipstream
Episode 5: SlipstreamEpisode 5: Slipstream
Episode 5: Slipstream
 
Lean Event 2013
Lean Event 2013Lean Event 2013
Lean Event 2013
 
Continuous Improvement in Government Conference
Continuous Improvement in Government ConferenceContinuous Improvement in Government Conference
Continuous Improvement in Government Conference
 
Artificial intelligence bsc - iso 27001 information security
Artificial intelligence   bsc - iso 27001 information securityArtificial intelligence   bsc - iso 27001 information security
Artificial intelligence bsc - iso 27001 information security
 
Food Safety Legislation - John Fallon
Food Safety Legislation - John FallonFood Safety Legislation - John Fallon
Food Safety Legislation - John Fallon
 
Developing Effective Checklists to Support the Internal Audit Function - Webinar
Developing Effective Checklists to Support the Internal Audit Function - WebinarDeveloping Effective Checklists to Support the Internal Audit Function - Webinar
Developing Effective Checklists to Support the Internal Audit Function - Webinar
 
Sosialisasi sni iso iec 38500-2015 rev2 - 15 des2015
Sosialisasi sni iso iec 38500-2015 rev2 - 15 des2015Sosialisasi sni iso iec 38500-2015 rev2 - 15 des2015
Sosialisasi sni iso iec 38500-2015 rev2 - 15 des2015
 
SAI Global's Lean Capability
SAI Global's Lean CapabilitySAI Global's Lean Capability
SAI Global's Lean Capability
 
Seafood Certification Programs
Seafood Certification ProgramsSeafood Certification Programs
Seafood Certification Programs
 
Guide d'utilisation de l'outil AUDITSec basé sur la nouvelle norme ISO 27002 ...
Guide d'utilisation de l'outil AUDITSec basé sur la nouvelle norme ISO 27002 ...Guide d'utilisation de l'outil AUDITSec basé sur la nouvelle norme ISO 27002 ...
Guide d'utilisation de l'outil AUDITSec basé sur la nouvelle norme ISO 27002 ...
 
Sarwono sutikno wisuda stsn - 10 nov 2015 v2
Sarwono sutikno   wisuda stsn - 10 nov 2015 v2Sarwono sutikno   wisuda stsn - 10 nov 2015 v2
Sarwono sutikno wisuda stsn - 10 nov 2015 v2
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
Perancangan Panduan Keamanan Cyber-Physical Systems (CPS) Nasional
Perancangan Panduan Keamanan Cyber-Physical Systems (CPS) NasionalPerancangan Panduan Keamanan Cyber-Physical Systems (CPS) Nasional
Perancangan Panduan Keamanan Cyber-Physical Systems (CPS) Nasional
 
Unhan membangun kemampuan siber indonesia di era perang informasi
Unhan   membangun kemampuan siber indonesia di era perang informasiUnhan   membangun kemampuan siber indonesia di era perang informasi
Unhan membangun kemampuan siber indonesia di era perang informasi
 
Poster-An Expert System for Car Failure Diagnosis
Poster-An Expert System for Car Failure DiagnosisPoster-An Expert System for Car Failure Diagnosis
Poster-An Expert System for Car Failure Diagnosis
 
E gov keamanan informasi 3 okt 2016 - kpk
E gov   keamanan informasi 3 okt 2016 - kpkE gov   keamanan informasi 3 okt 2016 - kpk
E gov keamanan informasi 3 okt 2016 - kpk
 
Sandingan ISO/IEC 27001 SMKI vs ISO 37001 SMAP
Sandingan ISO/IEC 27001 SMKI vs ISO 37001 SMAPSandingan ISO/IEC 27001 SMKI vs ISO 37001 SMAP
Sandingan ISO/IEC 27001 SMKI vs ISO 37001 SMAP
 
Validation and Verification of HACCP Plans - Webinar Presentation
Validation and Verification of HACCP Plans - Webinar PresentationValidation and Verification of HACCP Plans - Webinar Presentation
Validation and Verification of HACCP Plans - Webinar Presentation
 
Verification Planning of Food Safety System
Verification Planning of Food Safety SystemVerification Planning of Food Safety System
Verification Planning of Food Safety System
 

Similaire à WEBINAR: Transitioning to ISO/IEC 27001: 2013

ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
ISO 9001-2015 Revision Training Presentation
ISO 9001-2015 Revision Training PresentationISO 9001-2015 Revision Training Presentation
ISO 9001-2015 Revision Training PresentationDQS Inc.
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
 
ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças Fernando Palma
 
ISO 9001:2015 Revision Overview: part 2
ISO 9001:2015 Revision Overview: part 2ISO 9001:2015 Revision Overview: part 2
ISO 9001:2015 Revision Overview: part 2DQS Inc.
 
UL DQS India News Letter - iSeeek jun_2014
UL DQS India News Letter - iSeeek jun_2014UL DQS India News Letter - iSeeek jun_2014
UL DQS India News Letter - iSeeek jun_2014DQS India
 
NQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA
 
Presentation Revision Standards
Presentation Revision StandardsPresentation Revision Standards
Presentation Revision StandardsDQS India
 
Integrating sms and isms
Integrating sms and ismsIntegrating sms and isms
Integrating sms and ismsSeptafiansyah P
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?PECB
 
ISO 9001:2015 webinar Part 3 - UL DQS Inc
ISO 9001:2015 webinar Part 3 - UL DQS IncISO 9001:2015 webinar Part 3 - UL DQS Inc
ISO 9001:2015 webinar Part 3 - UL DQS IncDQS Inc.
 
Iso 2008 vs 2015
Iso 2008 vs 2015Iso 2008 vs 2015
Iso 2008 vs 2015Haya Haroon
 
Compliance Framework
Compliance FrameworkCompliance Framework
Compliance Frameworkbarnetdh
 
Iso 27001 transition to 2013 03202014
Iso 27001 transition to 2013   03202014Iso 27001 transition to 2013   03202014
Iso 27001 transition to 2013 03202014DQS Inc.
 

Similaire à WEBINAR: Transitioning to ISO/IEC 27001: 2013 (20)

ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
ISO 9001-2015 Revision Training Presentation
ISO 9001-2015 Revision Training PresentationISO 9001-2015 Revision Training Presentation
ISO 9001-2015 Revision Training Presentation
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças
 
314
314314
314
 
Cobit5
Cobit5Cobit5
Cobit5
 
ISO 9001:2015 Revision Overview: part 2
ISO 9001:2015 Revision Overview: part 2ISO 9001:2015 Revision Overview: part 2
ISO 9001:2015 Revision Overview: part 2
 
UL DQS India News Letter - iSeeek jun_2014
UL DQS India News Letter - iSeeek jun_2014UL DQS India News Letter - iSeeek jun_2014
UL DQS India News Letter - iSeeek jun_2014
 
NQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap Guide
 
Presentation Revision Standards
Presentation Revision StandardsPresentation Revision Standards
Presentation Revision Standards
 
Integrating sms and isms
Integrating sms and ismsIntegrating sms and isms
Integrating sms and isms
 
New ISO 20000-1:2018 Changes, Implementation Steps
New ISO 20000-1:2018 Changes, Implementation StepsNew ISO 20000-1:2018 Changes, Implementation Steps
New ISO 20000-1:2018 Changes, Implementation Steps
 
9001-2015
9001-20159001-2015
9001-2015
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
 
Khas bank isms 3 s
Khas bank isms 3 sKhas bank isms 3 s
Khas bank isms 3 s
 
ISO 9001:2015 webinar Part 3 - UL DQS Inc
ISO 9001:2015 webinar Part 3 - UL DQS IncISO 9001:2015 webinar Part 3 - UL DQS Inc
ISO 9001:2015 webinar Part 3 - UL DQS Inc
 
Iso 2008 vs 2015
Iso 2008 vs 2015Iso 2008 vs 2015
Iso 2008 vs 2015
 
27001 2013 iso geek
27001 2013 iso geek27001 2013 iso geek
27001 2013 iso geek
 
Compliance Framework
Compliance FrameworkCompliance Framework
Compliance Framework
 
Iso 27001 transition to 2013 03202014
Iso 27001 transition to 2013   03202014Iso 27001 transition to 2013   03202014
Iso 27001 transition to 2013 03202014
 

Dernier

8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 

Dernier (20)

8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 

WEBINAR: Transitioning to ISO/IEC 27001: 2013

  • 1. Transitioning to ISO 27001:2013
  • 2. 2 Welcome and Introductions SAI Global  Provides information services and solutions globally to: – Manage risk – Achieve compliance – Drive business improvement  Leading provider of ISO 27001 assurance services in the region  Provides training in understanding, implementing and auditing Information Security Management Systems
  • 3. 3 Introductions CQR  Largest Australian-owned independent information security consultancy  Experts in the design, implementation and operations of ISMS’ based on ISO 27001  Our specialists have assisted in excess of 20 organisations globally through the certification process  CQR has been certified to ISO 27001 for almost 9 years
  • 4. 4 Learning Outcomes  At the end of the session, you will have: – An understanding of the differences between the 2005 and 2013 version of ISO/IEC 27001 – Information to allow you to start to plan the necessary transition activities
  • 5. 5 Agenda  Brief history of ISO 27001 and 27002  Drivers for updating the standard  Changes to the mandatory clauses – 2005 – Clauses 4 to 8 – 2013 - Clauses 4 to 10  Key changes to Annex A  Transition Activities  Certification considerations  Q&A
  • 6. 6 The evolution of ISO 27001 revisited
  • 7. 7 ISO 27001 Revisited  Developed from BS 7799 Part 2  First released in 2005 as the core standard in the 27000 family for information security  Supporting standard ISO 27002 renamed from ISO 17799 in 2007  Both standards updated and published in 2013  ISO 27001 is the “auditable” and “certifiable” standard
  • 9. 9 Why the update?  Experience over the last 2 decades with a large number of organisations globally  The changing landscape (outsourcing, cloud etc.)  To align the standard with key principles within the ISO 31000 risk management standard
  • 10. 10 Why the update?  Driven by the need to align the structure of ALL ISO management systems standards – Shared language for all non-specific components of the management systems – Conformance with Annex SL requirements
  • 12. 12 Concepts and Context differences  No formal PDCA model any more as long as continual improvement occurs  Shift to move support of the ISMS to the executive management level (“top management”)  Management of risks has higher focus than control effectiveness  Now have the concept of “risk owner”
  • 13. 13 Changes to the mandatory clauses
  • 14. 14 Mandatory Clauses – 2005 version  Clauses 0-3 provide background and definitions  Clauses 4-8 provide the mandatory requirements for the ISMS  Clause 4 – Information security management system  Clause 5 – Management responsibility  Clause 6 – Internal ISMS audits  Clause 7 – Management review of the ISMS  Clause 8 – ISMS Improvement
  • 15. 15 Mandatory Clauses – 2013 version  Clauses 0-3 provide background  Clauses 4-10 provide the mandatory requirements for the ISMS  Clause 4 – Context of the organisation  Clause 5 – Leadership  Clause 6 – Planning  Clause 7 – Support  Clause 8 – Operation  Clause 9 – Performance evaluation  Clause 10 - Improvement
  • 16. 16 Key differences  Need to document motivation and context for operating an ISMS  Requirement to consider interfaces and dependencies with other parties  Need to include external risk sources and outsourced functions  Must be included in scope  The ISMS Policy has been removed and now only refers to an Information Security Policy
  • 17. 17 Key Differences  Alignment of risk approach to ISO 31000 rather than the current version of ISO 27005  Don’t need to identify assets, threats and vulnerabilities before risk identification  Risk sections now discuss “consequences” not “impact”  Formally requires risk owners to approve the risk treatment plans
  • 18. 18 Key Differences  Preventive action as a concept disappears – Replaced by “risks and opportunities”  Determination of controls is now part of the risk assessment, not a separate selection process from Annex A  However, still need to validate selected controls against Annex A to verify no necessary controls have been omitted  A Statement of Applicability is still required
  • 19. 19 Key Differences – Mandatory Procedures  2005 had 5 mandatory procedures  2013 has removed the explicit requirement  Still required to control documented information – Including supporting records  Internal Audit activity is still required but no longer requires a formal procedure  Non-conformity and corrective action must still occur  Explicit preventive action requirement is removed
  • 20. 20 Key Differences – Mandatory Requirements  Management Review changes – Must occur at planned intervals (used to be at least annually) – No longer defines specific precise inputs and outputs but provides a list of topics that need to be considered  Internal Audit – Statement that auditors shall not audit their won work has been removed – However, must be objective and impartial
  • 22. 22 Annex A  2005 had 133 controls in 11 sections  2013 has 114 controls in 14 sections  Some controls have been removed completely – E.g. A.12.5.4 Information leakage – A.11.5.6 Limitation of connection time  Others are combined – E.g. malicious and mobile code is now Malware (new A.12.2.1)  Some new controls added  My view – the new Annex A is a simplified set of controls that are more easily understood
  • 23. 23 Annex A  Have split Communications and Operations Management (A.10) into two – A.12 Operations security – A.13 Communications security  Also now have a separate section (A.10) for Cryptography  Business Continuity section has undergone significant change, focusing on embedding information security into the organisation’s BCMS – This section also addresses redundant facilities
  • 25. 25 Annexures B and C (2005)  Annex B contained the cross reference to the OECD principles  Also referred to the PDCA model which has been dropped  There is no equivalent annexure in the 2013 version  Annex C provided a cross-reference between 27001 and other standards  Given the revision of the other standards this section has also been removed with no replacement
  • 27. 27 Transition Activities  Assumption – you have an ISMS in place based on the ISO/IEC 27001:2005 standard – Equivalent to AS/NZS ISO/IEC 27001:2006  Assumption – Goal is to keep changes to a minimum
  • 28. 28 Transition Activities  Where to start? – Is a gap analysis worthwhile? – Yes, level will depend on how close you are to your system  You need to have some sort of transition plan and a gap analysis may help identify tasks  Once you have identified key activities, add them to your current system as improvement opportunities
  • 29. 29 Transition Activities  Document all “interested parties” – Internal and external  Re-visit your Scope statement – Make sure you capture the interfaces with third parties and the security requirements around these interfaces
  • 30. 30 Transition Activities  For Management, specifically allocate responsibility for – Ensuring the ISMS conforms with the standard – Reporting on the performance of the ISMS to top management  Capture business objectives and understand how your ISMS can assist in delivering against these (align business and security objectives)
  • 31. 31 Transition Activities  Review your ISMS policy (in 2013, called the Information Security Policy) and simplify if there is value in doing so. – You can leave it unchanged if it’s working! – Can add the roles and responsibilities previously discussed in this document if you wish
  • 32. 32 Transition Activities  Review your risk management procedure – Can simplify by removing the asset-threatvulnerability approach – Ensure that you have a process to identify and record “risk owners”  Revisit your risk assessments and get approval of treatments from the risk owners – Still need a record of acceptance of residual risk
  • 33. 33 Transition Activities  Revisit your Statement of Applicability (SoA) – Map risks against new Annex A controls – Just because a control has disappeared from Annex A does not mean you should remove it – If it still manages a risk, it should still appear in your SoA  Check references in the rest of your system to controls within the SoA (risk register etc.)
  • 34. 34 Transition Activities  Review the required documentation – Do you want to keep your versions of the old mandatory procedures – What documents can be retired? – What new documents are needed? – New documents may be required based on any new controls selected in your Statement of Applicability
  • 35. 35 Transition Activities  Potential new documents – Information security objectives (Not Annex A related) – A.14.2.1 Secure Development Policy – A.14.2.5 Secure Systems Engineering principles – A.15.1.1 InfoSec Policy for Supplier Relationships – A.16.1.7 a procedure for evidence management
  • 36. 36 Transition Activities  Revisit your metrics and measures – New version has more focus on metrics and measures – Need to identify what your metrics will be and how you will measure the performance of the ISMS  Only measure that which provides value (information on the performance of the ISMS)
  • 37. 37 Transition Activities  Need to ensure that you define – How things will be measured – Who monitors/measures – When will it be done – Who is going to look at the results – When will this happen
  • 38. 38 Additional Workshops  Melbourne – 9th December  Sydney – 10th December  Further information www.saiglobal.com or http://training.saiglobal.com/tis/promotion.aspx?id=a0 c20000005bAeQ
  • 40. 40 Certification  For new certifications, can choose to certify to the 2005 version until Sept 2014  For organisations currently certified to the 2005 version, you have until Sept 2015 to transition your system  Don’t leave it until the last minute, start making the necessary changes as soon as you can
  • 42. 42 Thanks for your attention Enjoy you day! david.simpson@cqr.com