iso 27001 - information security user awareness training presentation - part 3

22
iFour Consultancy Security awareness seminar An introduction to ISO27k Part 3

Upload: tanmay-shinde

Post on 20-Jun-2015

1.455 views

Category:

Technology


4 download

DESCRIPTION

Information security and ISO 27001-2013 standards and its importance. http://www.ifour-consultancy.com

TRANSCRIPT

Page 1: ISO 27001 - Information security user awareness training presentation - part 3

iFour Consultancy

Security awareness seminar

An introduction to ISO27k

Part 3

Page 2: ISO 27001 - Information security user awareness training presentation - part 3

ISO 27001 A brief history of ISO27k Plan-Do-Check-Act CONTROL CLAUSES IMPLEMENTATION PROCESS CYCLE Benefits Information security vision Who is responsible? Corporate Information Security Policy Physical security Password Guidelines Internet usage E-mail usage Security incidents Responsibilities

Agenda

http://www.ifour-consultancy.com Software outsourcing company in India

Page 3: ISO 27001 - Information security user awareness training presentation - part 3

ISO 27001

ISO/IEC 27001 is an information security management system (ISMS) standard published by ISO & IEC

It specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System (ISMS) within an organisation

It is designed to ensure the selection of adequate and proportionate security controls to protect information assets

http://www.ifour-consultancy.com Software outsourcing company in India

Page 4: ISO 27001 - Information security user awareness training presentation - part 3

http://www.ifour-consultancy.com Software outsourcing company in India

Page 5: ISO 27001 - Information security user awareness training presentation - part 3

A brief history of ISO27k

1990’s• Information Security Management Code of Practice produced by a UK government-sponsored working

group• Based on the security policy used by Shell• Became British Standard BS7799

2000’s• Adopted by ISO/IEC• Became ISO/IEC 17799 (later renumbered ISO/IEC 27002)• ISO/IEC 27001 published & certification scheme started

Now• Expanding into a suite of information security standards (known as “ISO27k”)• Updated and reissued every few years

http://www.ifour-consultancy.com Software outsourcing company in India

Page 6: ISO 27001 - Information security user awareness training presentation - part 3

ISO 27001

• Concerns the management of information security, not just IT/technical security

• Formally specifies a management system • Uses Plan, Do, Check, Act (PDCA) to achieve, maintain and improve

alignment of security with risks

• Covers all types of organizations (e.g. commercial companies, government agencies, not-for-profit organizations) and all sizes

• Thousands of organizations worldwide have been certified compliant

http://www.ifour-consultancy.com Software outsourcing company in India

Page 7: ISO 27001 - Information security user awareness training presentation - part 3

Plan-Do-Check-Act

http://www.ifour-consultancy.com Software outsourcing company in India

Page 8: ISO 27001 - Information security user awareness training presentation - part 3

CONTROL CLAUSES

http://www.ifour-consultancy.com Software outsourcing company in India

Page 9: ISO 27001 - Information security user awareness training presentation - part 3

CONTROL CLAUSES

Information security policy - management direction Organization of information security - management framework for

implementation Asset management – assessment, classification and protection of valuable

information assets HR security – security for joiners, movers and leavers Physical & environmental security - prevents unauthorised access, theft,

compromise, damage to information and computing facilities, power cuts

http://www.ifour-consultancy.com Software outsourcing company in India

Page 10: ISO 27001 - Information security user awareness training presentation - part 3

CONTROL CLAUSES

• Communications & operations management - ensures the correct and secure operation of IT

• Access control – restrict unauthorized access to information assets• Information systems acquisition, development & maintenance – build security into

systems• Information security incident management – deal sensibly with security incidents that

arise

• Business continuity management – maintain essential business processes and restore any that fail

• Compliance - avoid breaching laws, regulations, policies and other security obligations

http://www.ifour-consultancy.com Software outsourcing company in India

Page 11: ISO 27001 - Information security user awareness training presentation - part 3

IMPLEMENTATION PROCESS CYCLE

ASSET IDENTIFICATION & CLASSIFICATION

http://www.ifour-consultancy.com Software outsourcing company in India

Page 12: ISO 27001 - Information security user awareness training presentation - part 3

Benefits

Demonstrable commitment to security by the organization

Legal and regulatory compliance Better risk management Commercial credibility, confidence, and assurance Reduced costs Clear employee direction and improved awareness

http://www.ifour-consultancy.com Software outsourcing company in India

Page 13: ISO 27001 - Information security user awareness training presentation - part 3

Information security vision

• VisionThe organization is acknowledged as an industry leader for information security.

• MissionTo design, implement, operate, manage and maintain an Information Security Management System that complies with international standards, incorporating generally-accepted good security practices

http://www.ifour-consultancy.com Software outsourcing company in India

Page 14: ISO 27001 - Information security user awareness training presentation - part 3

Who is responsible?

• Information Security Management Committee

• Information Security Manager/CISO and Department

• Incident Response Team

• Business Continuity Team

• IT, Legal/Compliance, HR, Risk and other departments

• Audit Committee

• Last but not least, you

Information security is everyone’s responsibility

http://www.ifour-consultancy.com Software outsourcing company in India

Page 15: ISO 27001 - Information security user awareness training presentation - part 3

Corporate Information Security Policy

Policy is signed by the CEO and mandated by top management

Find it on the intranet

http://www.ifour-consultancy.com Software outsourcing company in India

Page 16: ISO 27001 - Information security user awareness training presentation - part 3

Physical security

http://www.ifour-consultancy.com Software outsourcing company in India

Page 17: ISO 27001 - Information security user awareness training presentation - part 3

Password Guidelines

http://www.ifour-consultancy.com Software outsourcing company in India

Page 18: ISO 27001 - Information security user awareness training presentation - part 3

Internet usage

http://www.ifour-consultancy.com Software outsourcing company in India

Page 19: ISO 27001 - Information security user awareness training presentation - part 3

E-mail usage

Do not use your corporate email address for personal email Do not circulate chain letters, hoaxes, inappropriate jokes,

videos etc. Do not send emails outside the organization unless you are

authorized to do so Be very wary of email attachments and links, especially in

unsolicited emails (most are virus-infected)

Use corporate email for business purposes only Follow the email storage guidelines If you receive spam email, simply delete it. If it is offensive

or you receive a lot, call the IT Help/Service Desk

http://www.ifour-consultancy.com Software outsourcing company in India

Page 20: ISO 27001 - Information security user awareness training presentation - part 3

Security incidents

Report information security incidents, concerns and near-misses to IT Help/Service Desk:

Email … Telephone … Anonymous drop-boxes …

Take their advice on what to do

Do not discuss security incidents with anyone outside the organization

Do not attempt to interfere with, obstruct or prevent anyone else from reporting incidents

Page 21: ISO 27001 - Information security user awareness training presentation - part 3

Ensure your PC is getting antivirus updates and patches

Lock your keyboard (Windows-L) before leaving your PC unattended, and log-off at the end of the day

Store valuable information (paperwork as well as CDs, USB sticks etc.) securely under lock and key

Take regular information back ups

Fulfill your security obligations: Comply with security and privacy laws, copyright and licenses, NDA (Non Disclosure Agreements) and

contracts

Comply with corporate policies and procedures

Stay up to date on information security: Visit the intranet Security Zone when you have a moment

Responsibilities

http://www.ifour-consultancy.com Software outsourcing company in India

Page 22: ISO 27001 - Information security user awareness training presentation - part 3

http://www.ifour-consultancy.com Software outsourcing company in India