SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
ISO 27001 audit evidence acquisition



ISO 27001 Audit evidence acquisition
THE NEXT GENERATION SECURITY AUDIT TOOL




Contents
Introduction ............................................................................................................................................ 3
IS Audit overview .................................................................................................................................... 4
Contact details ........................................................................................................................................ 4
The IS Auditor.......................................................................................................................................... 5
   Audit calendar ..................................................................................................................................... 5
   Audit scheduling ................................................................................................................................. 6
   Audit schedule alert ............................................................................................................................ 6
The IS Audit operation ............................................................................................................................ 7
   ISO policies and our solutions ............................................................................................................. 7
Organization of information security ...................................................................................................... 8
   Policy dashboard ................................................................................................................................. 8
   IS Policy with review dates.................................................................................................................. 8
   Organisation chart .............................................................................................................................. 9
   Procedure document supporting policy ............................................................................................. 9
Asset Management ................................................................................................................................. 9
   Asset management policies .............................................................................................................. 10
   Information asset register................................................................................................................. 10
Human resources security .................................................................................................................... 10
   HR Security policies and procedures................................................................................................. 11
Physical and Environmental Security .................................................................................................... 11
   Physical & environment security policies and procedures ............................................................... 11
Communications and Operations Management................................................................................... 11
   Communications and operations management policies and procedures ........................................ 12
Access Control ....................................................................................................................................... 12
   Access control policies and procedure ............................................................................................. 13
Information systems acquisition, development and maintenance ...................................................... 13
Information security incident management ......................................................................................... 14


www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition


   Incident register ................................................................................................................................ 14
Business Continuity Management ........................................................................................................ 14
Compliance ........................................................................................................................................... 14
Reporting noncompliance ..................................................................................................................... 15
   Non compliance – findings and recommendations .......................................................................... 15




www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition


Introduction

www.InformationsecurityAudtors.com provides a web based tool
(www.riesgoriskmanagement.com) for Auditors to capture information relating to ISO27001
compliance.

The difference the tool makes is the manner in which it acquires compliance evidence and how the
Auditor is able to determine the level of compliance and potential gaps.

Evidence reflects an organisation’s behaviour not just prior to the arrival of the auditors but possibly
going back for the last two quarters.

The solution is a web based tool that sits on the client’s site and access can be restricted or allowed
for 3rd parties. Internal auditors will be able to ensure compliance across all business units as long as
they have access to the intranet.




www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition


IS Audit overview




Contact details
For more information about acquiring the solution please contact

Ben Oguntala

Ben.oguntala@riesgoriskmanagement.com

Telephone - +44 7812 039 867




www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition


The IS Auditor

The IS Audit Department can set up accounts for Internal and external auditors, especially for the
external auditor, access to evidence is only granted for the period which the Audit is to be carried
out.

Access for Auditors limited to the Audit period only

An Auditor can schedule audits with business units using the Audit calendar , once scheduled an
Audit alert is sent to the business unit informing them of the Audit to take place.

Audit calendar




www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition


Audit scheduling




Audit schedule alert




www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition


The IS Audit operation


ISO policies and our solutions
The evidence the tool gathers for ISO 27001 include:

      Security Policy
          o Information security policy
          o Our solution
                   Where is the policy
                        Included
                   When was it published
                        Included
                   How was it disseminated
                        Included
                   When was it last updated
                        Included
                   Who is responsible for the policy
                        Included




www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition


Organization of information security

          o   Internal Organization
          o   External Parties

Policy dashboard




IS Policy with review dates




www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition


Organisation chart




Procedure document supporting policy




Asset Management

          o   Responsibility for assets
          o   Information classification



www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition


Asset management policies




Information asset register




Human resources security

          o   Prior to employment
          o   During employment
          o   Termination or change of employment




www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition


       HR Security policies and procedures




Physical and Environmental Security

          o   Secure Areas
          o   Equipment Security

Physical & environment security policies and procedures




Communications and Operations Management

          o   Operational Procedures and responsibilities
          o   Third party service delivery management
          o   System planning and acceptance
          o   Protection against malicious and mobile code
          o   Backup

www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition


Communications and operations management policies and procedures




Access Control

          o   Business Requirement for Access Control
          o   User Access Management
          o   User Responsibilities
          o   Network Access Control
          o   Operating system access control
          o   Application and Information Access Control
          o   Mobile Computing and teleworking




www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition


Access control policies and procedure




Information systems acquisition, development and maintenance

                    Same as above




www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition




Information security incident management

          o   Reporting information security events and weaknesses
          o   Management of information security incidents and improvements

Incident register




Business Continuity Management

          o   Information security aspects of business continuity management

              Same as above


Compliance

          o   Compliance with legal requirements
          o   Compliance with security policies and standards, and technical compliance
          o   Information Systems audit considerations


www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com
ISO 27001 audit evidence acquisition


Reporting noncompliance

Once the audit is completed the Auditor will be able to report on each non compliance that were
discovered against a business unit, information Asset, policy or areas.

The idea behind the process is to ensure that each none compliance is reported to the most
appropriate person to take action on the non compliance. All the non compliances together make up
the report.

Non compliance – findings and recommendations




More and more non compliances, finding and recommendations can be recorded against the Audit
providing a one source of all the history of the non compliance.

The activity log provides a running commentary of actions that have been taken by the Auditor or
the business unit to resolve the non compliance.




www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com
                               info@riesgoriskmanagement.com

Contenu connexe

Tendances

Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsUppala Anand
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA
 
Presentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMPresentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMShantanu Rai
 
Iso 27000 it management systems presentation peter greenham iigi fwr group i...
Iso 27000 it management systems  presentation peter greenham iigi fwr group i...Iso 27000 it management systems  presentation peter greenham iigi fwr group i...
Iso 27000 it management systems presentation peter greenham iigi fwr group i...IndependentCertificationServices
 
NQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity ChecklistNQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity ChecklistNQA
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001technakama
 
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?Lars Neupart
 
Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013SAIGlobalAssurance
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security BaselineBarry Caplin
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListSriramITISConsultant
 
How the the 2013 update of ISO 27001 Impacts your Risk Management
How the the 2013 update of ISO 27001 Impacts your Risk ManagementHow the the 2013 update of ISO 27001 Impacts your Risk Management
How the the 2013 update of ISO 27001 Impacts your Risk ManagementLars Neupart
 
The impact of GDPR on UK employers
The impact of GDPR on UK employersThe impact of GDPR on UK employers
The impact of GDPR on UK employersRalf Braga
 
Iso 27001 certification
Iso 27001 certificationIso 27001 certification
Iso 27001 certificationramya119
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationNetwork Intelligence India
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001PECB
 
PECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by KinvergPECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by KinvergKinverg
 
STAND OUT: Why You Should Become ISO 27001 Certified
STAND OUT: Why You Should Become ISO 27001 CertifiedSTAND OUT: Why You Should Become ISO 27001 Certified
STAND OUT: Why You Should Become ISO 27001 CertifiedSchellman & Company
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 ImplementationPECB
 

Tendances (20)

Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
 
Presentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCMPresentation on iso 27001-2013, Internal Auditing and BCM
Presentation on iso 27001-2013, Internal Auditing and BCM
 
Iso 27000 it management systems presentation peter greenham iigi fwr group i...
Iso 27000 it management systems  presentation peter greenham iigi fwr group i...Iso 27000 it management systems  presentation peter greenham iigi fwr group i...
Iso 27000 it management systems presentation peter greenham iigi fwr group i...
 
NQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity ChecklistNQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity Checklist
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
 
Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security Baseline
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_List
 
How the the 2013 update of ISO 27001 Impacts your Risk Management
How the the 2013 update of ISO 27001 Impacts your Risk ManagementHow the the 2013 update of ISO 27001 Impacts your Risk Management
How the the 2013 update of ISO 27001 Impacts your Risk Management
 
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013  ChecklistISO/IEC 27001:2005 naar ISO 27001:2013  Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
 
The impact of GDPR on UK employers
The impact of GDPR on UK employersThe impact of GDPR on UK employers
The impact of GDPR on UK employers
 
Iso 27001 certification
Iso 27001 certificationIso 27001 certification
Iso 27001 certification
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001
 
Iso 27001 Checklist
Iso 27001 ChecklistIso 27001 Checklist
Iso 27001 Checklist
 
PECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by KinvergPECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by Kinverg
 
STAND OUT: Why You Should Become ISO 27001 Certified
STAND OUT: Why You Should Become ISO 27001 CertifiedSTAND OUT: Why You Should Become ISO 27001 Certified
STAND OUT: Why You Should Become ISO 27001 Certified
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation
 

En vedette

Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approachtschraider
 
Audit on compay- company audit
Audit on compay- company auditAudit on compay- company audit
Audit on compay- company auditpillai college
 
Maintaining and updating your risk assessment using vsRisk
Maintaining and updating your risk assessment using vsRiskMaintaining and updating your risk assessment using vsRisk
Maintaining and updating your risk assessment using vsRiskMichael Francis
 
Using vsRisk to carry out a risk assessment
Using vsRisk to carry out a risk assessmentUsing vsRisk to carry out a risk assessment
Using vsRisk to carry out a risk assessmentMichael Francis
 

En vedette (8)

Advance Financial Accounting & Reporting
Advance Financial Accounting & ReportingAdvance Financial Accounting & Reporting
Advance Financial Accounting & Reporting
 
Tata steel
Tata steelTata steel
Tata steel
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
Audit project
Audit projectAudit project
Audit project
 
Audit on compay- company audit
Audit on compay- company auditAudit on compay- company audit
Audit on compay- company audit
 
Maintaining and updating your risk assessment using vsRisk
Maintaining and updating your risk assessment using vsRiskMaintaining and updating your risk assessment using vsRisk
Maintaining and updating your risk assessment using vsRisk
 
Using vsRisk to carry out a risk assessment
Using vsRisk to carry out a risk assessmentUsing vsRisk to carry out a risk assessment
Using vsRisk to carry out a risk assessment
 
Audit evidence
Audit evidenceAudit evidence
Audit evidence
 

Similaire à Iso 27001 Audit Evidence Acquisition

Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My OrganisationVigilant Software
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)AHM Pervej Kabir
 
The Importance of Risk Management
The Importance of Risk ManagementThe Importance of Risk Management
The Importance of Risk ManagementVigilant Software
 
Why ISO27001/ISO27005 for my organisation
Why ISO27001/ISO27005 for my organisationWhy ISO27001/ISO27005 for my organisation
Why ISO27001/ISO27005 for my organisationMichael Francis
 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxSIS Certifications Pvt Ltd
 
iso 27001 certification
iso 27001 certificationiso 27001 certification
iso 27001 certificationdenieljulian79
 
The importance of information security risk management
The importance of information security risk managementThe importance of information security risk management
The importance of information security risk managementMichael Francis
 
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...Tromenz Learning
 
Maintaining and updating your risk assessment using vsRisk
Maintaining and updating your risk assessment using vsRiskMaintaining and updating your risk assessment using vsRisk
Maintaining and updating your risk assessment using vsRiskVigilant Software
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Iso27001 Isaca Seminar (23 May 08)
Iso27001  Isaca Seminar (23 May 08)Iso27001  Isaca Seminar (23 May 08)
Iso27001 Isaca Seminar (23 May 08)samsontamwaiho
 
Iso27001 Isaca Seminar (23 May 08)
Iso27001  Isaca Seminar (23 May 08)Iso27001  Isaca Seminar (23 May 08)
Iso27001 Isaca Seminar (23 May 08)samsontamwaiho
 
ISO 27001 Certification What You Need to Know to Get Started.pdf
ISO 27001 Certification What You Need to Know to Get Started.pdfISO 27001 Certification What You Need to Know to Get Started.pdf
ISO 27001 Certification What You Need to Know to Get Started.pdfOFFICE
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMSAkhil Garg
 
The significance of the Shift to Risk Management from Threat & Vulnerability ...
The significance of the Shift to Risk Management from Threat & Vulnerability ...The significance of the Shift to Risk Management from Threat & Vulnerability ...
The significance of the Shift to Risk Management from Threat & Vulnerability ...PECB
 
vsRisk - features and benefits.ppt
vsRisk - features and benefits.pptvsRisk - features and benefits.ppt
vsRisk - features and benefits.pptscribdJobAN
 

Similaire à Iso 27001 Audit Evidence Acquisition (20)

Iso 27001 Audit Evidence Acquisitionv3
Iso 27001 Audit Evidence Acquisitionv3Iso 27001 Audit Evidence Acquisitionv3
Iso 27001 Audit Evidence Acquisitionv3
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
 
The Importance of Risk Management
The Importance of Risk ManagementThe Importance of Risk Management
The Importance of Risk Management
 
Why ISO27001/ISO27005 for my organisation
Why ISO27001/ISO27005 for my organisationWhy ISO27001/ISO27005 for my organisation
Why ISO27001/ISO27005 for my organisation
 
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptxISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
 
iso 27001 certification
iso 27001 certificationiso 27001 certification
iso 27001 certification
 
The importance of information security risk management
The importance of information security risk managementThe importance of information security risk management
The importance of information security risk management
 
Isms v kumar
Isms v kumarIsms v kumar
Isms v kumar
 
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
 
Maintaining and updating your risk assessment using vsRisk
Maintaining and updating your risk assessment using vsRiskMaintaining and updating your risk assessment using vsRisk
Maintaining and updating your risk assessment using vsRisk
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
ISO CERTIFICATIONS
ISO CERTIFICATIONSISO CERTIFICATIONS
ISO CERTIFICATIONS
 
Iso27001 Isaca Seminar (23 May 08)
Iso27001  Isaca Seminar (23 May 08)Iso27001  Isaca Seminar (23 May 08)
Iso27001 Isaca Seminar (23 May 08)
 
Iso27001 Isaca Seminar (23 May 08)
Iso27001  Isaca Seminar (23 May 08)Iso27001  Isaca Seminar (23 May 08)
Iso27001 Isaca Seminar (23 May 08)
 
ISO 27001 Certification What You Need to Know to Get Started.pdf
ISO 27001 Certification What You Need to Know to Get Started.pdfISO 27001 Certification What You Need to Know to Get Started.pdf
ISO 27001 Certification What You Need to Know to Get Started.pdf
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
The significance of the Shift to Risk Management from Threat & Vulnerability ...
The significance of the Shift to Risk Management from Threat & Vulnerability ...The significance of the Shift to Risk Management from Threat & Vulnerability ...
The significance of the Shift to Risk Management from Threat & Vulnerability ...
 
Cyber Security Management
Cyber Security ManagementCyber Security Management
Cyber Security Management
 
vsRisk - features and benefits.ppt
vsRisk - features and benefits.pptvsRisk - features and benefits.ppt
vsRisk - features and benefits.ppt
 

Plus de Ben Omoakin Oguntala, developingafrica(dot)net

Plus de Ben Omoakin Oguntala, developingafrica(dot)net (15)

Developing Africa Ode Remo brochure
Developing Africa Ode Remo brochureDeveloping Africa Ode Remo brochure
Developing Africa Ode Remo brochure
 
Developing Africa - Ode Remo
Developing Africa - Ode RemoDeveloping Africa - Ode Remo
Developing Africa - Ode Remo
 
Thisday story with Oguntala
Thisday story with OguntalaThisday story with Oguntala
Thisday story with Oguntala
 
Africa secretariat - The Home of African raw materials
Africa secretariat - The Home of African raw materials Africa secretariat - The Home of African raw materials
Africa secretariat - The Home of African raw materials
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Risk Assessment And Risk Treatment
Risk Assessment And Risk TreatmentRisk Assessment And Risk Treatment
Risk Assessment And Risk Treatment
 
Data Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing TimesData Protection Compliance In Economically Depressing Times
Data Protection Compliance In Economically Depressing Times
 
Privacy Impact Assessment Final
Privacy Impact Assessment FinalPrivacy Impact Assessment Final
Privacy Impact Assessment Final
 
Managing Information Asset Register
Managing Information Asset RegisterManaging Information Asset Register
Managing Information Asset Register
 
Fraud Monitoring Solution
Fraud Monitoring SolutionFraud Monitoring Solution
Fraud Monitoring Solution
 
Conformidad De Seguridad De InformacióNv2
Conformidad De Seguridad De InformacióNv2Conformidad De Seguridad De InformacióNv2
Conformidad De Seguridad De InformacióNv2
 
Gprs/3G Troubleshooter
Gprs/3G TroubleshooterGprs/3G Troubleshooter
Gprs/3G Troubleshooter
 
Pci V2
Pci V2Pci V2
Pci V2
 
FoI
FoIFoI
FoI
 
Dpa V3
Dpa V3Dpa V3
Dpa V3
 

Iso 27001 Audit Evidence Acquisition

  • 1. ISO 27001 audit evidence acquisition ISO 27001 Audit evidence acquisition THE NEXT GENERATION SECURITY AUDIT TOOL Contents Introduction ............................................................................................................................................ 3 IS Audit overview .................................................................................................................................... 4 Contact details ........................................................................................................................................ 4 The IS Auditor.......................................................................................................................................... 5 Audit calendar ..................................................................................................................................... 5 Audit scheduling ................................................................................................................................. 6 Audit schedule alert ............................................................................................................................ 6 The IS Audit operation ............................................................................................................................ 7 ISO policies and our solutions ............................................................................................................. 7 Organization of information security ...................................................................................................... 8 Policy dashboard ................................................................................................................................. 8 IS Policy with review dates.................................................................................................................. 8 Organisation chart .............................................................................................................................. 9 Procedure document supporting policy ............................................................................................. 9 Asset Management ................................................................................................................................. 9 Asset management policies .............................................................................................................. 10 Information asset register................................................................................................................. 10 Human resources security .................................................................................................................... 10 HR Security policies and procedures................................................................................................. 11 Physical and Environmental Security .................................................................................................... 11 Physical & environment security policies and procedures ............................................................... 11 Communications and Operations Management................................................................................... 11 Communications and operations management policies and procedures ........................................ 12 Access Control ....................................................................................................................................... 12 Access control policies and procedure ............................................................................................. 13 Information systems acquisition, development and maintenance ...................................................... 13 Information security incident management ......................................................................................... 14 www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 2. ISO 27001 audit evidence acquisition Incident register ................................................................................................................................ 14 Business Continuity Management ........................................................................................................ 14 Compliance ........................................................................................................................................... 14 Reporting noncompliance ..................................................................................................................... 15 Non compliance – findings and recommendations .......................................................................... 15 www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 3. ISO 27001 audit evidence acquisition Introduction www.InformationsecurityAudtors.com provides a web based tool (www.riesgoriskmanagement.com) for Auditors to capture information relating to ISO27001 compliance. The difference the tool makes is the manner in which it acquires compliance evidence and how the Auditor is able to determine the level of compliance and potential gaps. Evidence reflects an organisation’s behaviour not just prior to the arrival of the auditors but possibly going back for the last two quarters. The solution is a web based tool that sits on the client’s site and access can be restricted or allowed for 3rd parties. Internal auditors will be able to ensure compliance across all business units as long as they have access to the intranet. www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 4. ISO 27001 audit evidence acquisition IS Audit overview Contact details For more information about acquiring the solution please contact Ben Oguntala Ben.oguntala@riesgoriskmanagement.com Telephone - +44 7812 039 867 www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 5. ISO 27001 audit evidence acquisition The IS Auditor The IS Audit Department can set up accounts for Internal and external auditors, especially for the external auditor, access to evidence is only granted for the period which the Audit is to be carried out. Access for Auditors limited to the Audit period only An Auditor can schedule audits with business units using the Audit calendar , once scheduled an Audit alert is sent to the business unit informing them of the Audit to take place. Audit calendar www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 6. ISO 27001 audit evidence acquisition Audit scheduling Audit schedule alert www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 7. ISO 27001 audit evidence acquisition The IS Audit operation ISO policies and our solutions The evidence the tool gathers for ISO 27001 include:  Security Policy o Information security policy o Our solution  Where is the policy  Included  When was it published  Included  How was it disseminated  Included  When was it last updated  Included  Who is responsible for the policy  Included www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 8. ISO 27001 audit evidence acquisition Organization of information security o Internal Organization o External Parties Policy dashboard IS Policy with review dates www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 9. ISO 27001 audit evidence acquisition Organisation chart Procedure document supporting policy Asset Management o Responsibility for assets o Information classification www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 10. ISO 27001 audit evidence acquisition Asset management policies Information asset register Human resources security o Prior to employment o During employment o Termination or change of employment www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 11. ISO 27001 audit evidence acquisition HR Security policies and procedures Physical and Environmental Security o Secure Areas o Equipment Security Physical & environment security policies and procedures Communications and Operations Management o Operational Procedures and responsibilities o Third party service delivery management o System planning and acceptance o Protection against malicious and mobile code o Backup www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 12. ISO 27001 audit evidence acquisition Communications and operations management policies and procedures Access Control o Business Requirement for Access Control o User Access Management o User Responsibilities o Network Access Control o Operating system access control o Application and Information Access Control o Mobile Computing and teleworking www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 13. ISO 27001 audit evidence acquisition Access control policies and procedure Information systems acquisition, development and maintenance  Same as above www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 14. ISO 27001 audit evidence acquisition Information security incident management o Reporting information security events and weaknesses o Management of information security incidents and improvements Incident register Business Continuity Management o Information security aspects of business continuity management Same as above Compliance o Compliance with legal requirements o Compliance with security policies and standards, and technical compliance o Information Systems audit considerations www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com
  • 15. ISO 27001 audit evidence acquisition Reporting noncompliance Once the audit is completed the Auditor will be able to report on each non compliance that were discovered against a business unit, information Asset, policy or areas. The idea behind the process is to ensure that each none compliance is reported to the most appropriate person to take action on the non compliance. All the non compliances together make up the report. Non compliance – findings and recommendations More and more non compliances, finding and recommendations can be recorded against the Audit providing a one source of all the history of the non compliance. The activity log provides a running commentary of actions that have been taken by the Auditor or the business unit to resolve the non compliance. www.informationsecurityauditors.com powered by www.riesgoriskmanagement.com info@riesgoriskmanagement.com