ISO/IEC 27001:2013 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof.
ISO/IEC 27001:2013 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties.
ISO/IEC 27001:2013 is intended to be suitable for several different types of use, including the following:
- Use within organizations to formulate security requirements & objectives and also to ensure compliance with laws and regulations;
- Use within organizations as a way to ensure that security risks are cost effectively managed;
- Use within an organization as a process framework for the implementation and management of controls to ensure that the specific security objectives of an organization are met;
- Definition of new information security management processes;
- Identification and clarification of existing information security management processes;
- Use by the management of organizations to determine the status of information security management activities;
- Use by the internal and external auditors of organizations to determine the degree of compliance with the policies, directives and standards adopted by an organization;
- Use by organizations to provide relevant information about information security policies, directives, standards and procedures to trading partners and other organizations with whom they interact for operational or commercial reasons;
- Implementation of business-enabling information security;
- Use by organizations to provide relevant information about information security to customers.
Information is critical to the operation and perhaps even the survival of your organization. Being certified to ISO/IEC 27001 will help you to manage and protect your valuable information assets.
ISO/IEC 27001 is the only auditable international standard which defines the requirements for an Information Security Management System (ISMS). The standard is designed to ensure the selection of adequate and proportionate security controls.
Who is it relevant to?
ISO/IEC 27001 is suitable for any organization, large or small, in any sector or part of the world. The standard is particularly suitable where the protection of information is critical, such as in the finance, health, public and IT sectors.
Certifying your ISMS against ISO/IEC 27001 can bring the following benefits to your organization:
- Demonstrates the independent assurance of your internal controls and meets corporate governance and business continuity requirements;
- Independently demonstrates that applicable laws and regulations are observed;
- Provides a competitive edge by meeting contractual requirements and demonstrating to your customers that the security of their information is paramount;
- Independently verifies that your organizational risks are properly identified, assessed and managed, while formalizing information security processes, procedures and documentation;
- Proves your senior management's commitment to the security of its information;
- The regular assessment process helps you to continually monitor your performance and improve.
Note: these benefits are not realized by organizations who simply comply with ISO/IEC 27001 or the recommendations in the Code of Practice standard, ISO/IEC 17799.
Implementation of ISO 27001 certification
If you are wondering where you start with ISO 27001 implementation, the ISO 27001 standard defines a 6 stage process which is closely related to the iterative PDCA approach mentioned earlier. The Plan-Do-Check-Act is in quotes a type of a mindset that the company has to acquire to effectively live; it says how to live. The 6 stage process describes what it is the company needs to do to live the ISO 27001 standard.
Define an information Security Policy. Define scope of the Information Security Management System (ISMS). Perform a security risk assessment. Manage the identified risk. Select controls to be implemented and applied. Prepare a Statement of Applicability (SoA).