my company is ISO 9001 certified and we are currently working on
implementing an ISMS (ISO 27001).
We do have identified the processes which should be within the ISMS
scope and my question here is regarding the actual ISMS scope document
and ist required level of detail.
The structure I have in mind is as follows:
1. High-level executive summary of the ISMS scope
2. Responsibility for maintaining the scope document
3. ISMS Scope document change approval authority
4. Execution of ISMS scope document content
5. Review cycle of ISMS Scope document
6. Methods of defining the ISMS scope
7. Processes within the ISMS
7.1. Process 1: Name
7.1.1. Process 1: Reason why process is part of the ISMS
7.1.2 Process 1: Matrix: people involved in process and in what
function (decide, implement, etc)
7.1.3 Process 1: Locations and rooms where process is executed
7.1.4 Process 1: Key hardware needed for executing process
7.1.5 Process 1: Key IT-Applications/Software needed for executing
process
7.1.6 Process 1: Key communications technology needed for executing
process
7.1.7 Process 1: Key electronical and physical data needed for
executing process
7.1.8 Process 1: Key internal services/supporting processes needed
for executing process
7.1.9 Process 1: Key external services/supporting processes needed
for executing process
7.1. Process n: Name
7.n.1. Process n: Reason why process is part of the ISMS
7.n.2 Process n: Matrix: people involved in process and in what
function (decide, implement, etc)
7.n.3 Process n: Locations and rooms where process is executed
7.n.4 Process n: Key hardware needed for executing process
7.n.5 Process n: Key IT-Applications/Software needed for executing
process
7.n.6 Process n: Key communications technology needed for executing
process
7.n.7 Process n: Key electronical and physical data needed for
executing process
7.n.8 Process n: Key internal services/supporting processes needed
for executing process
7.n.9 Process n: Key external services/supporting processes needed
for executing process
8. Processes outside the ISMS
8.1. Process 1: Name
8.1.1. Process 1: Reason why process is not part of the ISMS
8.n. Process n: Name
8.n.1. Process n: Reason why process is not part of the ISMS
9. Version, Approval etc
I’d like to achieve the following: everybody in the company should get
a profound and clear understanding of the processes and underlying
assets within the scope and which ones are outside it. On the other
hand the scope document with its assets inventories should serve as
basis for the risk analysis.
As I don’t have any experiences I’d like to know if you think that
this approach is feasible.
What do you think? I’m looking forward to your replies,
Mat
Hello,
I have an information security policy document that complies with the
requirements of ISO 27001 and then the following supporting policies:
Email AUP
Internet AUP
Clear Desk Policy
Software Policy
Unauthorised Access Policy
Antivirus Policy
Disposal of ICT Equipment Policy
ICT Procurement Policy
Information Asset Protection Policy
Information Backup and Storage Policy
Password Policy
Physical Security Policy
Removable Media Policy
Reporting Information Security Events Policy
Telephones Policy
Hi Marck.?? The security incident definition in ISO/IEC 27000 doesn't explicitly mention business continuity
> However, there's still this subject of business continuity implied in
> the scope of security incident definition that leads me to confussion.
per se.
"information security incident: single or a series of unwanted or unexpected information security
events (2.20) that have a significant probability of compromising business operations and
threatening information security (2.19)"
I guess you are referring to the phrase 'compromising business operations', which could be taken to
imply something about business disruption.Not exactly. Let's look at the '27000 definition in some detail. Noted follow.
> Should only a disruption in business continuity which was caused by a
> security incident be reported in the incident reports of the
> organization?
The definition essentially states that events that have 'a significant probability' [A] of
'compromising business operations' [B] and 'threatening information security' [C], qualify as
information security incidents.
[A] 'Significant probability' includes both events that *definitely* do, or *most likely* will,
cause problems for the business as incidents. In other words, it is not absolutely essential to
know for certain that there have been significant impacts.
[B] 'Compromising business operations' is open to interpretation, but I believe the intended meaning
was that incidents are significant, damaging the organization in some meaningful way (i.e. causing
significant direct or indirect costs, value degradation, losses, disruption, damaged
reputation/brand or whatever), not just some trivial annoyance that has little real impact. (That's
the point I was making in my last reply.) Your interpretation may well differ from mine, and that's
cool: as I said, it's your call. Maybe others who are still with us on this thread would care to
comment, either way?
[C] Given that information security is formally defined in '27000 (as CIA, plus other factors),
'threatening information security' I believe is intended to include events that *threaten* to
compromise C and/or I and/or A (and/or the other factors), whether or not they *actually* damage
CIA+. For example, if some confidential personal or proprietary information is inappropriately
exposed on the Internet or in a plaintext email, whether the information is definitely compromised
(e.g. appears in the news headlines) or not, doesn't particularly matter: it may still be a serious
incident as far as the organization is concerned. Likewise if, say, a malware infection
*potentially* damages the integrity of data in an important database: the untrustworthiness of the
database after infection (whether or not it is known, for certain, to have been corrupted or
whatever) may cause real issues for the business, so this would count as an incident.Agreed, that is one single incident.
> My understanding is that a denial of service attack on our database
> servers qualifies as a business continuity security incident and
> should be registered.
An "unexpected error" *does* sound like an information security event to me, contrary to your
> However according to ISO 27001, should we register an unexpected error
> on those same database servers which was not caused by an related
> security issue and had effect on business continuity?
statement that it "was not cause by an related security issue". If the "unexpected error" caused
some meaningful business problem, or had the potential to have done so, then yes this is indeed an
incident.
Don't get caught in the trap of thinking that "security" is all about deliberate attacks, hacks,
malware infections or whatever. It equally includes accidental, blameless causes such as bugs,
storms, fires and so forth. The important point is not how the event was caused, but how severe it
was and how much damage it caused. Try to keep that business focus in mind all the time. We are
not just securing stuff for the hell of it, but because the business needs it.The only situation I can think of where a business continuity plan might be invoked *not* in
> Altough it's obvious that a business continuity plan is started as
> soon as the event affects normal operations of business , i am trying
> to understand if Incident Managament should keep track of such events.
response to a security incident, would be a BCP exercise or test, in which case the invocation is
deliberate and pre-approved by management. Management would only do this if they anticipated the
benefits of the exercise/test (namely the assurance from successful testing that it would actually
work properly if needed for real, and the personnel training value of exercising the plan)
outweighing the risks and costs such as business disruption caused by invoking the plan. If in fact
the exercise/test went horribly wrong, it could turn into an event, an incident or even a total
bloomin disaster if the costs far outweighed the benefits!!
MORE
No comments:
Post a Comment