1170
1170
Printed in Malaysia
Acknowledgement
CyberSecurity Malaysia wishes to thank the following individuals who have contributed and/
or reviewed this guideline.
External Contributors/Reviewers:
1. Lt. Col. Asmuni Yusof (Retired) (Malaysian Communications and Multimedia Commission
(MCMC))
2. Azleyna Ariffin (JARING Communications Sdn Bhd)
3. Haliza Ibrahim (SIRIM Berhad )
4. Jamaludin Ibrahim (International Islamic University Malaysia (IIUM))
5. Noorhisam Rusmani (RHB Bank Berhad)
6. Nur Hidayah Abdullah (Malaysian Administrative Modernization and Management
Planning Unit (MAMPU))
7. Assoc. Prof Dr. Omar Zakaria (National Defence University of Malaysia (UPNM))
8. Rafidah Abdul Hamid (Cyber Intelligence Sdn Bhd)
9. Raja Azrina Raja Othman (British Telecommunications Malaysia)
10. Rahayu Lop (Extol MSC Berhad)
11. Rodney Especkerman (Extol MSC Berhad)
12. Rozana Rusli (KPMG Management and Risk Consulting Sdn Bhd)
13. Sazlin Alias (SIRIM QAS International Sdn Bhd)
14. Shamsul Baharin Deraman (RHB Bank Berhad)
15. Yap Pei Shan (Price WaterhouseCoopers (PwC) Advisory Services Sdn Bhd)
Internal Contributors/Reviewers:
1. Abd Rouf Mohammed Sayuti
2. Ida Rajemee Ramlee
3. Maslina Daud
4. Noor Aida Idris
5. Norhazimah Abdul Malek
6. Nuzeita Hashim
7. Sabariah Ahmad
8. Siti Hajar Mohamad Ali
9. Syafiqa Anneisa Abdullah
10. Wan Nasra Wan Firuz
ii
Table of Contents
Executive Summary.............................................................................................................................. v
1. Introduction.................................................................................................................................... 1
1.1 Objectives ............................................................................................................................ 1
1.2 Scope................................................................................................................................... 1
1.3 Target Audience................................................................................................................... 2
1.4 Justifications for ISMS Implementation ................................................................................. 2
1.5 Benefits of ISMS Implementation........................................................................................... 3
1.6 Critical Success Factors for ISMS Implementation.................................................................. 3
2. Terms and Definitions..................................................................................................................... 5
3. Abbreviated Terms......................................................................................................................... 8
4. Pre-implementation Process............................................................................................................ 9
4.1 Define Information Security Requirements ........................................................................... 9
4.2 Identify ISMS Scope and Boundaries ................................................................................... 10
4.3 Conduct Gap Analysis (optional)......................................................................................... 11
4.4 Obtain Top Management Approval ..................................................................................... 11
4.5 Establish Roles and Responsibilities.................................................................................... 12
4.5.1 Roles and Responsibilities for Top Management..................................................... 13
4.5.2 Roles and Responsibilities for ISMS Steering Committee......................................... 14
4.5.3 Roles and Responsibilities of ISMS Lead Team........................................................ 14
4.5.4 Roles and Responsibilities of ISMS Implementation Team....................................... 15
4.6 Attend Relevant Training.................................................................................................... 16
4.7 Obtain Relevant Standards ................................................................................................ 16
5. Documentation............................................................................................................................. 18
5.1 Control of Documented Information .................................................................................. 18
5.2 Mandatory Documented Information ................................................................................. 19
5.3 Other Mandatory Documented Information Derived From Risk Assessment .......................22
6. Risk Assessment .......................................................................................................................... 24
6.1 Risk Assessment Methodology............................................................................................ 25
6.2 Risk Assessment Exercise .................................................................................................. 25
6.3 Risk Treatment................................................................................................................... 28
6.4 Controls Selection and Statement of Applicability (SOA) ..................................................... 29
6.5 Risk Treatment Plan Formulation........................................................................................ 30
6.6 Risk Treatment Plan Implementation................................................................................... 31
7. Leadership and Support ............................................................................................................... 32
7.1 Leadership and Management Commitment......................................................................... 32
7.2 Provision of Resources........................................................................................................ 32
7.3 Competence and Awareness Programme............................................................................. 32
7.4 Communication ................................................................................................................. 33
8. Review and Monitor ..................................................................................................................... 34
8.1 ISMS Measurement ............................................................................................................. 34
8.1.1 Information Security Measurement Programme...................................................... 34
8.2 ISMS Internal Audit ............................................................................................................ 36
8.3 Phase 1: Pre Internal Audit ................................................................................................. 37
8.4 Phase 2: During Internal Audit .......................................................................................... 39
8.5 Phase 3: Post Internal Audit .............................................................................................. 39
8.6 Management Review........................................................................................................... 40
9. Maintain and Improve................................................................................................................... 41
9.1 Nonconformities and Corrective Actions ............................................................................ 41
9.2 Continual Improvement ..................................................................................................... 41
10. ISMS Certification Process........................................................................................................... 42
10.1 Preparation for ISMS Certification........................................................................................ 42
10.2 ISMS Certification Process by Certification Body.................................................................. 43
10.3 Surveillance Audit............................................................................................................... 45
10.4 Recertification.................................................................................................................... 46
Appendix A - Examples of ISMS Scope Statement .............................................................................. 47
Appendix B - Common Timeline for ISMS Implementation and Certification........................................ 48
Appendix C - Additional Roles and Responsibilities in Information Security ....................................... 49
Appendix D - Recommended Readings............................................................................................... 51
Appendix E - Methods to Obtain Standard ......................................................................................... 54
Appendix F - Example of Challenges in Conducting Risk Assessments .............................................. 55
Appendix G - References.................................................................................................................... 58
iii
List of Figures
Figure
Figure
Figure
Figure
Figure
Figure
1:
2:
3:
4:
5:
6:
List of Tables
Table
Table
Table
Table
Table
Table
Table
Table
iv
1:
2:
3:
4:
5:
6:
7:
8:
Executive Summary
It is irrefutable that information is a valuable asset to an organisation regardless of the
form i.e. on paper or digital. Many business operations depend highly on this information
in their critical business processes. Thus, organisations need to protect such information
appropriately.
Information should be protected to secure confidentiality, integrity and availability. In addition,
other elements such as non-repudiation and authentication should also be considered.
More organisations have come to realize the importance of protecting and securing their
information.
Information Security Management System (ISMS) is a framework which enables organisations
to manage security incidents holistically and systematically. The benefits of adopting and
deploying this information security management framework are extensive. Its adoption and
deployment is a tedious and lengthy process and the level of commitment is high, but the
benefits, surpasses all that.
This guideline provides a holistic view on how to jumpstart the ISMS implementation.
Organisations would be able to have a better understanding of ISMS implementation; thus
easing the process and ensuring appropriate utilisation of resources whilst implementing
ISMS.
1. Introduction
Information Security Management System (ISMS) is defined as that part of the overall
management system, based on a business risk approach, to establish, implement, operate,
monitor, review, maintain and improve information security. The management system, which
includes organisational structures, policies, planning activities, responsibilities, practices,
procedures, processes and resources; is important due to evolving risks and the need to be
managed systematically.
As a whole, ISMS is a systematic approach in managing an organisations information security.
There are various mechanisms being practiced by different organisations in managing
information security. Amongst which is through an information security management
system based on ISO/IEC 27001:20051 Information Security Management Systems (ISMS) Requirements.
This guideline should not be used as the sole reference when implementing ISMS; other
relevant standards and/or guidelines should also be referred to, to complement information
shared in this guideline.
NOTE: This guideline makes reference to various relevant standards. For dated references
made to standards e.g. ISO/IEC 27001:2005 ISMS - Requirements, only the edition cited i.e.
2005 applies. For undated references, e.g. ISO/IEC 27001 ISMS Requirements, the latest
edition of the referenced document (including any amendments) applies.
1.1 Objectives
The objectives of this guideline are as follows:
a) To provide a holistic view and practical guidance of the processes in preparation
for ISMS implementation based on ISO/IEC 27001:2005 ISMS - Requirements;
b) To provide guidance that are aligned with the requirements specified in ISO/IEC
DIS 27001:2012 ISMS - Requirements2 ; and
c) To equip all types of organisations with valuable information in implementing
ISMS, with only minimal guidance from external parties.
1.2 Scope
This guideline takes the form of explanations of the following processes that are
required for ISMS implementation:
a) Pre-implementation process
b) Documentations
c) Risk Assessment
d) Leadership and Support
e) Review and Monitor
f) Maintain and Improve
NOTE: Certain processes from (a) to (f) can occur simultaneously depending on the
organisations scale and complexity.
This guideline also describes the processes involved regarding ISMS certification for
organisations intending to pursue the stated certification.
1
ISO/IEC DIS 27001:2012 is published as a Draft of International Standard in 2012. This standard is expected to be
published as an International Standard in 2013 (at the time of the publication of this guideline).
Questions
Does your organisation own assets which are important to your business
and/or service; and that any significant damage to these assets may cause
serious ramifications to your organisation?
Has the known threat (e.g. natural disaster, accidental or malicious intent)
that affects your organisation been managed systematically?
No
7
Questions
Does your organisation own information infrastructure(s) which is (are) very
important to the nation where significant disruption or destruction would
have a devastating impact on any of the following? Consider the following
impacts:
National Security and Defence
National Economic Strength
National Image
Government Capabilities to Function or
Public Health and Safety
NOTE: From here onwards, the five impacts are referred to as SEIGH.
NOTE: The Malaysian government has initiated several initiatives for ISMS to be
implemented. For example:
--
--
NSC Directive No. 24 that was issued in 2012 by the National Security Council
(NSC) which states that all CNII agencies/organisations are required to
implement ISMS as part of the National Cyber Crisis Management Framework.
NOTE 2 to Entry: Documented information can refer to: the management system, including
related processes; information created in order for the organisation to operate (documentation);
evidence of results achieved (records);
(ISO/IEC DIS 27001:2012)
Guideline
Recommendation of what is expected to be done to achieve an objective.
(ISO/IEC 27000:2012)
Impact
Adverse change to the level of business objectives achieved.
(ISO/IEC 27000:2012)
Information Security
Preservation of confidentiality, integrity and availability of information
NOTE: In addition, other properties, such as authenticity, accountability, non-repudiation,
and reliability can may also be involved.
(ISO/IEC 27000:2012)
Information Security Management System (ISMS)
Part of the overall management system, based on a business risk approach, to establish,
implement, operate, monitor, review, maintain and improve information security.
(ISO/IEC 27000:2012)
Information Security Risk
Potential that a threat will exploit a vulnerability of an asset or group of assets and thereby
cause harm to the organisation.
(ISO/IEC 27000:2012)
Integrity
Property of protecting the accuracy and completeness of assets.
(ISO/IEC 27000:2012)
Non-Conformity
Non-fulfilment of a requirement.
[ISO 9000:2005]
Policy
Overall intention and direction as formally expressed by management.
(ISO/IEC 27000:2012)
Procedure
Specified ways to carry out an activity or a process.
(ISO/IEC 27000:2012)
Process
Set of interrelated or interacting activities which transforms inputs into outputs.
(ISO/IEC 27000:2012)
Reliability
Property of consistent intended behaviour and results.
(ISO/IEC 27000:2012)
Risk
Combination of the probability of an event and its consequence.
(ISO/IEC 27000:2012)
Risk Acceptance
Decision to accept a risk.
(ISO/IEC 27000:2012)
Risk Analysis
Systematic use of information to identify sources and to estimate risk.
NOTE: Risk analysis provides a basis for risk evaluation, risk treatment and risk acceptance.
(ISO/IEC 27000:2012)
Risk Assessment
Overall process of risk analysis and risk evaluation.
(ISO/IEC 27000:2012)
Risk Criteria
Terms of reference by which the significance of risk is assessed.
(ISO/IEC 27000:2012)
Risk Management
Coordinated activities to direct and control an organisation with regard to risk.
NOTE: Risk management generally includes risk assessment, risk treatment, risk acceptance,
risk communication, risk monitoring and risk review.
(ISO/IEC 27000:2012)
Risk Treatment
Process of selection and implementation of measures to modify risks.
(ISO/IEC 27000:2012)
Service
Service is always the result of an activity or interaction between a service supplier and a
customer and can take many forms.
Service can be provided to support an organisations own products, for a product supplied by
a customer or involve the provision of an intangible thing to a customer (e.g. entertainment,
transportation, or advisory)
(ISO 9000:2005)
Statement of Applicability
Documented statement describing the control objectives and controls that are relevant and
applicable to the organisations ISMS.
(ISO/IEC 27000:2012)
Threat
Potential cause of an unwanted incident, which may result in harm to a system or organisation.
(ISO/IEC 27000:2012)
Vulnerability
Weakness of an asset or control that can be exploited by a threat.
(ISO/IEC 27000:2012)
3. Abbreviated Terms
For the purpose of this document, the following abbreviated terms apply:
CB
Certification Body
CNII
CISO
ICT
IEC
ISO
ISMS
IT
Information Technology
MOSTI
NSC
RTP
SME
SOA
Statement of Applicability
4. Pre-implementation Process
This chapter explains the pre-implementation process that is required for an ISMS
implementation. Figure 1 describes the processes required for pre-implementation, which are
crucial for the implementation of an ISMS.
ISO/IEC 27003:2010
10
In order to identify ISMS scope and boundaries, organisations should perform the
following activities4:
a) consider the organisations information security requirements which have been
identified in 4.1 - Define Information Security Requirements;
b) consider any interfaces and dependencies between activities performed by the
organisation, and those that are performed by other organisations;
c) consider critical services that can cause major impact to the organisation and/or
nation arising from losses of confidentiality, integrity or availability;
d) define the organisational scope and boundaries;
e) define Information Communication Technology (ICT) scope and boundaries,
f) define physical scope and boundaries; and
g) integrate elementary scope and boundaries to obtain the ISMS scope and
boundaries.
For clarity, organisations may seek the advice of a Certification Body (CB) on the
proposed ISMS scope and boundaries, as and when the need arises.
Finally, ensure that the ISMS scope is documented and approved by the top management.
ISO/IEC 27003:2010
11
timeline and required resources have been produced based on the gap analysis; all of
that will be used as input for developing a business case to the top management. The
business case should be presented for approval to initiate the ISMS implementation.
Language and style used in the business case should be suited for top management.
Top management approval is crucial to ensure continuous commitment towards the
implementation of ISMS (see also 7.1 Leadership and Management Commitment for
further information).
In summary, the following subjects5 should be covered when presenting a business
case to the management:
a) establishment of the ISMS governing structure, which will have the primary roles
and responsibilities in implementing the ISMS in an organisation. (see also 4.5
Establish Roles and Responsibilities);
b) goals and specific objectives of why the ISMS implementation is initiated (see also
1.4 Justifications for ISMS Implementation and 4.1 Define Information Security
Requirements);
c) benefits of ISMS implementation to the organisation that includes monetary
benefits, competitive advantage and confidence from stakeholders (see also 1.5
Benefits of ISMS Implementation);
d) preliminary scope of ISMS including business units/departments that may be
affected during the ISMS implementation (see also 4.2 Identify ISMS Scope and
Boundaries). ISMS preliminary scope has to be aligned with existing information
security requirements (if any);
e) initial ISMS implementation plan which is derived from results of gap analysis. The
plan should include the following:
i) scope of work that is required for implementing ISMS based on the identified
ISMS scope and boundaries (see also 4.3 Conduct Gap Analysis);
ii) required resources that should include but not limited to applications, systems
and technologies;
iii) proposed personnel who are required not only for the initial ISMS
implementation, but also throughout the whole process;
iv) implementation considerations including existing information security controls
that are in place or that may involve external parties;
v) timeline with key milestones. The timeline will depend on factors such as
the readiness of the organisation, competencies of personnel, ISMS scope
and boundaries, and resources that are allocated for the implementation.
Please refer to Appendix B Common Timeline for ISMS Implementation and
Certification for further information; and
vi) expected costs; costs may include training that should be attended by relevant
personnel, procuring related hardware and software; implementing controls,
and hiring personnel and engaging external parties (if any).
f) critical success factors (CSFs) to implement ISMS (see 1.6 Critical Success Factors
for further information); and
g) other factors affecting the organisations ISMS (e.g. technology, business
environment, risk tolerance, geographic location)
NOTE: Details of ISMS scope, timeline and resources presented in a business case can
be refined during the ISMS implementation.
ISO/IEC 27003:2010
12
4.5.1
13
c) ensuring that the resources needed for the ISMS are available;
d) communicating the importance of effective information security
management and conforming to the ISMS requirements;
e) ensuring that the ISMS achieves its intended outcome(s);
f) approving related information security policies, procedures, risks and
residual risks;
g) directing and supporting persons to contribute to the effectiveness of the
ISMS;
h) promoting continual improvement; thus it is crucial that the support
and commitment from management is consistent and visible during the
upcoming years in which ISMS is implemented and being maintained; and
i) supporting other relevant management roles to demonstrate their
leadership as it applies to their areas of responsibility.
4.5.2
4.5.3
14
ISO/IEC 27003:2010
15
Apart from the roles and responsibilities explained above, there are additional
roles and responsibilities as stipulated in Appendix C Additional Roles and
Responsibilities in Information Security.
16
17
5. Documentation
This chapter covers the process of managing the lifecycle of documented information, which
is from the creation phase to the disposition phase. It describes the mandatory documented
information that is required by ISMS and other mandatory documented information derived
from a risk assessment exercise.
Documented information created through ISMS implementation are required to be maintained
and kept for a period of time that can sufficiently verify the effectiveness of the controls
implemented in ISMS. Organisations should refer to regulatory requirements and their
organisational retention policy for the established retention period. For the purpose of ISMS
certification/recertification, the documented information is to be retained for the next external
audit. Please refer to Chapter 10.1 Preparation for ISMS Certification.
18
d) Control of changes
Modification of documented information should be controlled in terms of the
following:
- Modification details (e.g. name of person, date of changes, history logs,
version numbers);
- Reason for the changes.
e) Retention and Disposition
Retention and disposition of documented information should be controlled in
terms of the following:
-- Retention period (e.g. how long data should be kept). The retention period is
subject to organisations regulatory and/or security requirement;
-- Reasons for retention (e.g. why the need to keep the documented information.
For some organisations, the reasons may be due to legal obligations;
-- Disposition details (e.g. responsible person, date of disposal, which and why
documented information need to be disposed)
10
Description
Reference in
ISO/IEC DIS
27001:2012
19
Information
2. Information
Security Policy
Description
Reference in
ISO/IEC DIS
27001:2012
Information
Security
Policy
is
the Clause 5.2 e)
highest-level policy, which overarches
other supporting policies for ISMS
implementation. Guidance on the content
of an information security policy document
is provided in ISO/IEC 27002.
In addition, Annex D of ISO/IEC 27003:2010
provides additional guidance on the
structure of Information Security Policy.
The Information Security Policy should be
made available to the respective people
within the organisation as well as other
interested parties.
3. Information
security risk
assessment
process
4. Information
Information security risk treatment process Clause 6.1.2
security risk
should be documented in terms of selection
treatment process of appropriate risk treatment options
considering the risk assessment results.
5. Information
security
objectives
6. Evidence of
competence
7. Documented
information to the
necessary extent
to meet the
confidence that
the processes
have been carried
out as planned
20
Information
Description
Reference in
ISO/IEC DIS
27001:2012
8. Results of the
information
security risk
assessments
9. Statement of
Applicability
(SOA)
10. Information
security risk
treatment plan
(RTP)
12. Evidence of
Monitoring and measuring is an important Clause 9.1
monitoring and
process in ISMS. Any evidence that exists
measuring results as a result of monitoring and measuring
activities should be documented. The
documented information should include
what is to be monitored and measured
(which can include information security
processes and controls), the mechanisms
to perform this; and also the personnel
responsible to monitor, measure, analyse
and evaluate the outcome of monitoring
and measuring the ISMS.
21
14. Evidence of
the results of
management
reviews
Information
Description
Reference in
ISO/IEC DIS
27001:2012
NOTE: The requirements for the information above may be covered by one or more
documents.
11
General Description
1. Organisation
of information
security
2. Asset
management
3. Human resources
security
4. Communications
and operations
management
22
Areas of Security
Control
23
General Description
5. Access controls
6. Information
systems
acquisition,
development and
maintenance
7. Information
security incident
management
8. Business
continuity
management
9. Compliance
6. Risk Assessment
Information security risk management is defined as a process to analyse what can happen
and what are the possible consequences, before deciding what should be done and when, to
reduce the risk to an acceptable level12.
In ISMS, a risk management process is conducted for the purpose of preserving the
confidentiality, integrity and availability of its information assets and to manage information
security risks. Risk assessment, an important process in risk management, is the determination
of the potential impact of all risks by assessing the likelihood that it will occur and the impact
if it should occur13.
NOTE: ISO/IEC 27005:2011 - Information Security Risk Management - provides guidelines
to organisations for managing information security risk. It supports the general concepts
specified in ISO/IEC 27001:2005 and is designed to assist the satisfactory implementation of
information security based on a risk management approach14. Organisations should obtain a
copy of this standard for a detailed understanding on information security risk management
(refer to Appendix E - Methods to Obtain Standard, for further information on how to obtain
a copy of the standard).
There are several processes that will be discussed in this chapter. Figure 3 describes the risk
assessment process flow.
12
ISO/IEC 27005:2011
13
ISO/IEC 27005:2011
14
www.iso.org
24
g) Assess impacts
26
ISO/IEC 27005:2011
27
ISO/IEC 27005:2011
17
ISO/IEC 27005:2011
28
b) Risk retention
If the level of risk meets the risk acceptance criteria, as defined in the risk
methodology, there is no need for implementing additional controls and the
risk can be retained. Risk retention (also known as risk acceptance) is selected
by organisations when a decision has been made to accept the risk and to bear
with the consequences if the risk occurs. Organisations should document these
decisions. Thus, top management are aware of the risk and can knowingly accept
it.
c) Risk avoidance
When the identified risks are considered too high, or the costs of implementing
other risk treatment options exceeds the benefits of its implementation, a decision
may be made to avoid the risk completely, by withdrawing from a planned or
existing activity or set of activities, or changing the conditions under which the
activity is operated. For example, for risks caused by nature, it may be more cost
effective to physically move the information processing facilities to a place where
the risk does not exist or is under control. However, consideration must be given
to impacts and implications before opting for risk avoidance.
d) Risk sharing
Risk sharing (previously known as risk transfer) involves a decision to share certain
risks with external parties. Risk sharing can create new risks or modify existing,
identified risks. As such, additional risk treatment may be necessary. In addition,
there is a need to analyse the costs of these risks, for example, costs that include
external parties such as insurance companies, who will bear the consequences
(generally, on monetary loss) if the risk materialises.
Each domain contains a number of security categories within the domain; and each
security category contains:
a) a control objective stating what is to be achieved and
b) one or more controls that can be applied to achieve the above control objective.
The list of Annex A of ISO/IEC 27001 is not exhaustive. Organisations are free to
add new controls as required, or identify additional controls from any source, which
are deemed necessary. Nevertheless, organisations are recommended to refer to the
Annex A of ISO/IEC 27001 prior to looking at other sources. This is to ensure that
no important control options are overlooked. Also, not all controls will be relevant to
every situation; organisations should consider local environmental or technological
constraints that may affect the selection of controls.
Statement of Applicability (SOA) is one of the mandatory documented information
produced after the selection of controls (refer to item number 9 Statement of
Applicability of Table 2: List of mandatory documented information in Chapter 5.2 Mandatory Documented Information).
The SOA should consist of the following18:
-- Controls and the associated control objectives that have been selected;
-- Existing controls and controls that are to be implemented based on the risk
assessment exercise mapped to the relevant references; and
-- Justifications for exclusion of controls in Annex A of ISO/IEC 27001; for example,
organisations that do not provide electronic commerce services. Therefore,
controls on electronic commerce may not be suitable or applicable.
18
30
31
32
Target Audience
ISMS awareness to
management
Top management
ISMS Implementation
Training
The programme can be in any form of activity (such as classroom training, outdoor
activities, posters, quizzes and emails) depending upon the resources and the target
audience.
A general ISMS awareness programme should be conducted, at least once, prior to
ISMS implementation. The frequency to conduct general ISMS awareness programmes
varies and depends largely on the organisation and its available resources. Ideally, the
general ISMS awareness programme may need to be conducted periodically at planned
intervals (e.g. quarterly basis). It is also useful if the organisation includes the general
ISMS awareness programme during induction programmes for new personnel.
7.4 Communication
Any information related to ISMS needs to be communicated to the personnel so that they
are aware of any updates, activities and changes to existing policies and procedures.
In addition, certain information related to ISMS may need to be communicated to
external parties such as vendors or service providers. In general, organisations are
required to19:
a) determine what information should be communicated;
b) specify when the information is to be communicated;
c) identify who the information should be communicated to
NOTE: different audience may require different mechanism of communication;
d) select an appropriate personnel (or department) to be responsible for execution
of the communication; and
e) establish a communication process.
Organisations should determine the mechanism for the communication process,
based on their requirements. Communication can be in various forms. It can be via
electronic mediums (emails, online quizzes, etc), on paper (memos, letters, posters,
etc) or verbally (meetings, awareness and training sessions). Organisations may also
wish to organise outdoor activities such as treasure hunts or games as a means of
communication.
19
33
20
ISO/IEC 27004:2009
21
ISO/IEC 27004:2009
34
35
22
36
Perform Audit
(Fieldwork)
Audit Report
Follow-up
Planning: Establish
Audit Team
Planning: Establish
Audit Plan
37
Scepticism is an attitude of doubting that particular claims or statements are true or that something will happen
(source: Longman Dictionary of Contemporary English)
24
ISO 19011:2011
38
39
25
40
41
26
CSM27001, csm27001.cybersecurity.my/services.html
42
43
ISO/IEC 27006:2011
28
ISO/IEC 27006:2011
44
vii) whether the organisations procedures for risk assessment and risk treatment
appropriately reflects its activities and extends to the boundaries of the ISMS
scope, and that it also addresses services or activities that are not completely
within the scope of the ISMS; and
viii) links between the normative requirements, policy, performance objectives
and targets, any applicable legal requirements, responsibilities, competence
of personnel, operations, procedures, performance data and internal audit
findings and conclusions.
Where non-conformities are observed, the CB will formally document it in a NonConformity Report (NCR)/Opportunities For Improvement (OFI) template. The
organisation should define all non-conformities and provide an appropriate set of
corrective actions to resolve the identified non-conformities.
f) Certification Approval
All information and audit evidence gathered during the Stage 1 and Stage 2 audits
will be analysed to review the audit findings and agree on the audit conclusions.
The CB will make the final decision after all non-conformities have been resolved on
the basis of an evaluation of the audit findings. The organisation will be informed
of this decision immediately.
g) Issuance of Certificate
Once approved for certification, the organisation will be entitled to receive a copy
of the ISMS certificate.
A CB grants to the organisation, upon receipt of the certificate, a non-exclusive,
non-transferable and revocable license to use a certification mark applicable to
the scope that has been certified in the manner described by the CB.
Information about ISMS certified organisations will be made available publicly on
the CBs website.
Organisations may request to amend details in their ISMS certificate at any point
of time. These amendments may include the name of the organisation, change of
address or the scope of the ISMS certification. Request for such changes should
be made in writing to the CB.
29
ISO/IEC 27006:2011
45
10.4 Recertification
Renewal of certification is subject to a satisfactory recertification audit carried out
before the expiry date of the certificate. A recertification audit should be planned and
conducted to evaluate the continued fulfilment of ISO/IEC 27001 requirements.
The recertification audit should include an on-site audit that addresses the following30:
i) confirmation of the continued conformity and effectiveness of the ISMS as a whole,
and its continued relevance and applicability for the scope of certification;
ii) review of the effectiveness of the ISMS in light of internal and external changes,
and its continued relevance and applicability to the scope of ISMS certification;
iii) demonstrated commitment to maintain the effectiveness and improvement of the
ISMS in order to enhance overall performance;
iv) whether the operation of the certified ISMS contributes to the achievement
of the organisations policies and objectives; and
v) consideration of the performance of the organisations ISMS over the period of
certification, and inclusion of the review of previous surveillance audit reports.
Recertification audit activities may need to have a Stage 1 audit in situations where
there have been significant changes to the ISMS, the organisation, or the context in
which the ISMS is operating.
During a recertification audit, if instances of non-conformity or lack of evidence of
conformity are identified, the CB will define time limits for corrective actions to be
implemented prior to the expiration of certification.
30
ISO/IEC 27006:2011
46
31
www.iso27001certificates.com
47
Percentage of
organisations that
received ISMS certification
Within 2 years
93 percent
12 months or less
60 percent
6 months or less
20 percent
32
48
33
Stakeholder
Chief Information
Security Officer
(CISO)
System Administrator
IT Manager
Legal Advisor
Many information security risks have legal aspects and the legal
advisor is responsible for taking these into consideration.
Archive Officer
Privacy Officer
System Developer
Specialist/Expert
49
Role
External Consultant
Employee/Personnel/
Staff/User
Trainer
Local IT or IS
responsible
Champion (Influential
Person)
50
Recommended Readings
Description
ISO/IEC 27000:2009
- Information security
management systems Overview and vocabulary
ISO/IEC 27002:2005
- Code of practice for
information security
management
ISO/IEC 27003:2010
- Information security
management system
implementation guidance
ISO/IEC 27004:2009
- Information security
management
Measurement
51
No
Recommended Readings
Description
ISO/IEC 27006:2011
- Requirements for
bodies providing audit
and certification of
information security
management systems
ISO/IEC TR 27008:2011
- Guidelines for auditors
on information security
controls
ISO/IEC 27011:2008
- Information security
management guidelines
for telecommunication
organisations based on
ISO/IEC 27002
10
11
12
13
52
No
Recommended Readings
Description
14
Risk Assessment
Guideline, MAMPU, 2010
15
Risk Management
Guide for Information
Technology Systems, NIST
SP 800-30, 2002
53
34
www.iso.org
35
www.iso.org
36
www.msonline.gov.my
37
smsonline.sirim.my/Committee_Ctrl.do?op=retrieveISCCommittee&page=isc&id=ISC/G&type=I&isccode=G
38
smsonline.sirim.my/Committee_Ctrl.do?op=retrieveTCCommittee&page=1&id=TC/G/5&type=T&isccode=G
39
smsonline.sirim.my/Committee_Ctrl.do?op=retrieveWGCommittee&page=1&id=WG/G/5-1&type=W&isccode=G
54
Recommended Approaches
Challenge #1:
2. Perform
discussions
with
risk
management unit on alignment.
Likelihood is that a separate procedure
document will be required, which will
adopt the ERM framework, and will
be reported to Risk Management on
an on-going basis.
3. Typical areas of alignment include:
-- Risk assessments
-- Categories of risks
-- Risk acceptance criterias
-- Risk treatment options
Challenge #2:
55
Recommended Approaches
3. In
CNII
areas
and
critical
infrastructures such as power /
water /nuclear plants, oil and gas,
core telecommunication networks,
etc. it is quite likely that there
are large and dispersed amounts
of assets, which will not be easy to
be inventoried e.g. serial numbers
information might not be available
and may not be collectable from
the assets, since this may cause
operational downtime.
Challenge #3:
Large scale of assets within scope
of implementation and therefore no
central inventory exists.
The bigger the scope of implementation
is the bigger the scope of the assets
this typically brings the issue that the
operational teams will tend to combine
the assets to bypass the asset listing
process however sometimes by
doing this they will omit certain critical
components, and might not assign the
correct value to them. To overcome
this issue it is suggested that a formal
method for grouping of assets is defined.
Challenge #4:
56
Recommended Approaches
Challenge #5:
Certain
assets
are
maintained/
managed by outsourced vendors or by
third parties.
Multi-tenancy of assets.
The challenge here talks about assets
of multiple organisations hosted at the
same location e.g. co-hosting, cosharing of infrastructure, cloud services,
etc. Typically, concerns are raised
during risk assessment phases since
either the clients do not have control
over the way the service is provided or if
it is a national, regional or international
service, further security controls might
not be easy to implement. Multi-tenancy
brings in the issues in relation to data
leakage,
information
privacy
and
confidentiality, integrity issues, etc.
57
Appendix G - References
[1]
58