ISO 27001:2022 What has changed.pdf

Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001Cybersecurity and Privacy Expert à RAOS Project Oy
ISO 27001:2022.
What has changed?
by Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001
www.patreon.com/AndreyProzorov
1.0, 25.10.2022
Agenda
2
1. Purchasing
2. Life cycle
3. New Name
4. Abstract
5. Number of pages
6. New terminology databases
7. New relevant requirements, 4.2
8. More focus on processses, 4.4 ISMS
9. New requirements for 6.2 IS objectives
10. Planning for changes (NEW)
11. New requirements for 7.4 Communication
12. New requirements for 8.1 Planning
13. New requirements for 9.1 Monitoring
14. New structure of 9.2 and 9.3, and a new input for
Management Review
15. New structure of 10 Improvement
16. NEW Annex A. IS Controls
17. IS Control list and Mapping
18. ISO 27002:2022. Example of Attributes
19. If you have the ISMS, you will need to do
20. Contacts
3
www.iso.org/standard/82875.html
≈119 Euro
Life cycle
4
1. New Name
5
ISO/IEC 27001:2013 ISO/IEC 27001:2022
Information technology —
Security techniques —
Information security management
systems — Requirements
Information security, cybersecurity
and privacy protection —
Information security management
systems — Requirements
This document specifies the requirements for establishing,
implementing, maintaining and continually improving an
information security management system within the context
of the organization.
This document also includes requirements for the assessment
and treatment of information security risks tailored to the
needs of the organization.
The requirements set out in this document are generic and
are intended to be applicable to all organizations, regardless
of type, size or nature.
Excluding any of the requirements specified in Clauses 4 to 10
is not acceptable when an organization claims conformity to
this document. [New 2022]
6
2. Abstract
3. Number of pages
7
ISO/IEC 27001:2013 ISO/IEC 27001:2022
23 19
4. New terminology databases
8
ISO/IEC 27001:2013 ISO/IEC 27001:2022
3 Terms and definitions
For the purposes of this document, the
terms and definitions given in ISO/IEC
27000 apply.
3 Terms and definitions
For the purposes of this document, the
terms and definitions given in ISO/IEC
27000 apply.
ISO and IEC maintain terminology databases
for use in standardization at the following
addresses:
— ISO Online browsing platform: available
at https://www.iso.org/obp
— IEC Electropedia: available at
https://www.electropedia.org
5. New relevant requirements, 4.2
9
ISO/IEC 27001:2013 ISO/IEC 27001:2022
4.2 Understanding the needs and
expectations of interested parties
The organization shall determine:
a) interested parties that are relevant to the
information security management system;
and
b) the requirements of these interested
parties relevant to information security.
4.2 Understanding the needs and
expectations of interested parties
The organization shall determine:
a) interested parties that are relevant to the
information security management system;
b) the relevant requirements of these
interested parties;
c) which of these requirements will be
addressed through the information
security management system.
6. More focus on processses, 4.4 ISMS
10
ISO/IEC 27001:2013 ISO/IEC 27001:2022
4.4 Information security management
system
The organization shall establish, implement,
maintain and continually improve an
information security management system, in
accordance with the requirements of this
International Standard.
4.4 Information security management
system
The organization shall establish, implement,
maintain and continually improve an
information security management system,
including the processes needed and
their interactions, in accordance with the
requirements of this document.
7. New requirements for 6.2 IS objectives
11
ISO/IEC 27001:2013 ISO/IEC 27001:2022
6.2 Information security objectives and
planning to achieve them
The organization shall establish information
security objectives at relevant functions and
levels.
The information security objectives shall:
a) be consistent with the information security
policy;
b) be measurable (if practicable);
c) take into account applicable information
security requirements, and results from risk
assessment and risk treatment;
d) be communicated; and
e) be updated as appropriate.
6.2 Information security objectives and
planning to achieve them
The organization shall establish information
security objectives at relevant functions and
levels.
The information security objectives shall:
a) be consistent with the information security
policy;
b) be measurable (if practicable);
c) take into account applicable information
security requirements, and results from risk
assessment and risk treatment;
d) be monitored;
e) be communicated;
f) be updated as appropriate;
g) be available as documented information.
8. Planning for changes (NEW)
12
ISO/IEC 27001:2013 ISO/IEC 27001:2022
-
6.3 Planning of changes
When the organization determines the need
for changes to the information security
management system, the changes shall be
carried out in a planned manner.
9. New requirements for 7.4 Communication
13
ISO/IEC 27001:2013 ISO/IEC 27001:2022
7.4 Communication
The organization shall determine the need
for internal and external communications
relevant to the information security
management system including:
a) on what to communicate;
b) when to communicate;
c) with whom to communicate;
d) who shall communicate; and
e) the processes by which communication
shall be effected.
7.4 Communication
The organization shall determine the need
for internal and external communications
relevant to the information security
management system including:
a) on what to communicate;
b) when to communicate;
c) with whom to communicate;
d) how to communicate.
10. New requirements for 8.1 Planning
14
ISO/IEC 27001:2013 ISO/IEC 27001:2022
8.1 Operational planning and control
The organization shall plan, implement and control
the processes needed to meet information security
requirements, and to implement the actions
determined in 6.1. The organization shall also
implement plans to achieve information security
objectives determined in 6.2.
The organization shall keep documented information
to the extent necessary to have confidence that the
processes have been carried out as planned.
The organization shall control planned changes and
review the consequences of unintended changes,
taking action to mitigate any adverse effects, as
necessary.
The organization shall ensure that outsourced
processes are determined and controlled.
8.1 Operational planning and control
The organization shall plan, implement and control
the processes needed to meet requirements, and to
implement the actions determined in Clause 6, by:
— establishing criteria for the processes;
— implementing control of the processes in
accordance with the criteria.
Documented information shall be available to the
extent necessary to have confidence that the
processes have been carried out as planned.
The organization shall control planned changes and
review the consequences of unintended changes,
taking action to mitigate any adverse effects, as
necessary.
The organization shall ensure that externally provided
processes, products or services that are relevant to
the information security management system are
controlled.
11. New requirements for 9.1 Monitoring
15
ISO/IEC 27001:2013 ISO/IEC 27001:2022
9.1 Monitoring, measurement, analysis
and evaluation
…
The organization shall retain appropriate
documented information as evidence of the
monitoring and measurement results.
9.1 Monitoring, measurement, analysis
and evaluation
…
Documented information shall be available
as evidence of the results.
The organization shall evaluate the
information security performance and the
effectiveness of the information security
management system.
12. New structure of 9.2 and 9.3
16
ISO/IEC 27001:2013 ISO/IEC 27001:2022
9.2 Internal audit
9.3 Management review
9.2 Internal audit
9.2.1 General
9.2.2 Internal audit programme
9.3 Management review
9.3.1 General
9.3.2 Management review inputs
9.3.3 Management review results
+new input for Management review:
c) changes in needs and expectations of
interested parties that are relevant to the
information security management system
13. New structure of 10 Improvement
17
ISO/IEC 27001:2013 ISO/IEC 27001:2022
10.1 Nonconformity and corrective action
10.2 Continual improvement
10.1 Continual improvement
10.2 Nonconformity and corrective action
14. NEW Annex A. IS Controls
18
Information security controls reference (Annex A)
19
ISO/IEC 27001:2013 ISO/IEC 27001:2022
Total number of controls – 114 Total number of controls – 93, 11 new
Domains:
A.5 Information security policies
A.6 Organisation of information security
A.7 Human resource security
A.8 Asset management
A.9 Access control
A.10 Cryptography
A.11 Physical and environmental security
A.12 Operations security
A.13 Communications security
A.14 System acquisition, development, and maintenance
A.15 Supplier relationships
A.16 Information security incident management
A.17 Information security aspects of business continuity
management
A.18 Compliance
Controls are categorized as:
a) People, if they concern individual people
b) Physical, if they concern physical objects
c) Technological, if they concern technology
d) otherwise they are categorized as Organizational
Five attributes only in ISO 27002:2022 (#):
1. Control type (Preventive, Detective, Corrective)
2. Information security properties (CIA)
3. Cybersecurity concepts (Identify, Protect, Detect,
Respond and Recover)
4. Operational capabilities
5. Security domains
20
21
NEW 2022:
A.5.7 Threat intelligence
A.5.23 Information security for use of cloud services
A.5.30 ICT readiness for business continuity
A.7.4 Physical security monitoring
A.8.9 Configuration management
A.8.10 Information deletion
A.8.11 Data masking
A.8.12 Data leakage prevention
A.8.16 Monitoring activities
A.8.23 Web filtering
A.8.28 Secure coding
www.patreon.com/posts/iso-27001-2013-73584456
ISO 27002:2022. Example of Attributes
22
If you have the ISMS, you will need to do:
1. Review the Risk Treatment Plan (RTP), align it with the new structure and numbering of
controls.
2. Review and update the Statement of Applicability (SoA). I recommend using 2 spreadsheets
(2013 and 2022) in the next 1-2 years.
3. Review and update the ISMS Management review procedure (inputs).
4. Review and update IS objectives and the Monitoring, measurement, analysis and evaluation
procedure.
5. Review and update the ISMS Communication Plan.
6. Review and update other policies, standards and procedures (if necessary).
7. Review and update checklists and questionnaires used for audits (internal and external).
8. Evaluate and possibly adapt third-party security tools (e.g., GRC, SIEM, VM) to ensure the
records you are using to demonstrate compliance support the new requirements.
23
Thanks!
www.linkedin.com/in/andreyprozorov
www.patreon.com/AndreyProzorov
24
My ISMS Implementation Toolkit (ISO 27001)
25
www.patreon.com/posts/47806655
My ISMS Implemantation Plan
26
1 sur 26

Recommandé

ISO/IEC 27001:2022 – What are the changes? par
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?PECB
5.4K vues66 diapositives
ISO 27001_2022 What has changed 2.0 for ISACA.pdf par
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
1.6K vues58 diapositives
ISO 27001 Awareness/TRansition.pptx par
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma
1.4K vues44 diapositives
27001 awareness Training par
27001 awareness Training27001 awareness Training
27001 awareness TrainingDr Madhu Aman Sharma
388 vues28 diapositives
ISO 27001:2022 Introduction par
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 IntroductionAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
6.5K vues40 diapositives
ISO 27001 - Information security user awareness training presentation - part 3 par
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
24.9K vues22 diapositives

Contenu connexe

Tendances

Steps to iso 27001 implementation par
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementationRalf Braga
1.8K vues18 diapositives
NQA ISO 27001 Implementation Guide par
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
457 vues32 diapositives
ISMS Part I par
ISMS Part IISMS Part I
ISMS Part Ikhushboo
2.7K vues37 diapositives
ISO 27001 Benefits par
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 BenefitsDejan Kosutic
11.7K vues14 diapositives
Improve Cybersecurity posture by using ISO/IEC 27032 par
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
5.2K vues37 diapositives
ISO 27001 Certification - The Benefits and Challenges par
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesCertification Europe
5.7K vues11 diapositives

Tendances(20)

Steps to iso 27001 implementation par Ralf Braga
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
Ralf Braga1.8K vues
NQA ISO 27001 Implementation Guide par NQA
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
NQA 457 vues
ISMS Part I par khushboo
ISMS Part IISMS Part I
ISMS Part I
khushboo2.7K vues
Improve Cybersecurity posture by using ISO/IEC 27032 par PECB
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
PECB 5.2K vues
Overview of ISO 27001 ISMS par Akhil Garg
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
Akhil Garg1.5K vues
ISO 27001:2013 Implementation procedure par Uppala Anand
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
Uppala Anand20.1K vues
Basic introduction to iso27001 par Imran Ahmed
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
Imran Ahmed10.7K vues
Iso27001 The Road To Certification par tschraider
Iso27001   The Road To CertificationIso27001   The Road To Certification
Iso27001 The Road To Certification
tschraider3.1K vues
Awareness ISMS ISO 27001:2013 par Ali Fuad R
Awareness ISMS ISO 27001:2013Awareness ISMS ISO 27001:2013
Awareness ISMS ISO 27001:2013
Ali Fuad R822 vues
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know par PECB
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
PECB 2.2K vues
Implementing ISO27001 2013 par scttmcvy
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
scttmcvy1.8K vues
Project plan for ISO 27001 par technakama
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
technakama4.5K vues
2022 Webinar - ISO 27001 Certification.pdf par ControlCase
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
ControlCase1.2K vues

Similaire à ISO 27001:2022 What has changed.pdf

ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist par
ISO/IEC 27001:2005 naar ISO 27001:2013  ChecklistISO/IEC 27001:2005 naar ISO 27001:2013  Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013 ChecklistLloyd's Register Quality Assurance Nederland
8.1K vues12 diapositives
Iso 27001 certification par
Iso 27001 certificationIso 27001 certification
Iso 27001 certificationramya119
182 vues10 diapositives
PECB Webinar: ISO 13485:201X - Dis 2 - Proposed changes par
PECB Webinar: ISO 13485:201X - Dis 2 - Proposed changesPECB Webinar: ISO 13485:201X - Dis 2 - Proposed changes
PECB Webinar: ISO 13485:201X - Dis 2 - Proposed changesPECB
869 vues54 diapositives
Bsi iso27001-mapping-guide par
Bsi iso27001-mapping-guideBsi iso27001-mapping-guide
Bsi iso27001-mapping-guidefloora_jj
1.1K vues22 diapositives
ISO_ 27001:2022 Controls & Clauses.pptx par
ISO_ 27001:2022 Controls & Clauses.pptxISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxforam74
88 vues15 diapositives
ISO/IEC 27001:2013 An Overview par
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
40K vues7 diapositives

Similaire à ISO 27001:2022 What has changed.pdf(20)

Iso 27001 certification par ramya119
Iso 27001 certificationIso 27001 certification
Iso 27001 certification
ramya119182 vues
PECB Webinar: ISO 13485:201X - Dis 2 - Proposed changes par PECB
PECB Webinar: ISO 13485:201X - Dis 2 - Proposed changesPECB Webinar: ISO 13485:201X - Dis 2 - Proposed changes
PECB Webinar: ISO 13485:201X - Dis 2 - Proposed changes
PECB 869 vues
Bsi iso27001-mapping-guide par floora_jj
Bsi iso27001-mapping-guideBsi iso27001-mapping-guide
Bsi iso27001-mapping-guide
floora_jj1.1K vues
ISO_ 27001:2022 Controls & Clauses.pptx par foram74
ISO_ 27001:2022 Controls & Clauses.pptxISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptx
foram7488 vues
ISO/IEC 27001:2013 An Overview par Ahmed Riad .
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
Ahmed Riad .40K vues
20220911-ISO27000-SecurityStandards.pptx par Suman Garai
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx
Suman Garai24 vues
Tư vấn và đào tạo ISO 27001:2022 phiên bản mới bởi HQC Consulting par Nguyễn Đăng Quang
Tư vấn và đào tạo ISO 27001:2022 phiên bản mới bởi HQC ConsultingTư vấn và đào tạo ISO 27001:2022 phiên bản mới bởi HQC Consulting
Tư vấn và đào tạo ISO 27001:2022 phiên bản mới bởi HQC Consulting
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall. par Jerimi Soma
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.
Jerimi Soma1.1K vues
NQA ISO 9001 to ISO 27001 Gap Guide par NQA
NQA ISO 9001 to ISO 27001 Gap GuideNQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap Guide
NQA 358 vues
Continuous Compliance Monitoring par ControlCase
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
ControlCase815 vues
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ... par PECB
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB 2.8K vues
ISO Cloud Security add-on & PCI DSS mapping 【Continuous Study】 par Jerimi Soma
ISO Cloud Security add-on & PCI DSS mapping 【Continuous Study】ISO Cloud Security add-on & PCI DSS mapping 【Continuous Study】
ISO Cloud Security add-on & PCI DSS mapping 【Continuous Study】
Jerimi Soma162 vues
ISO_TC_176_SC2_N1286_Guidance_on_the_req.pdf par Haris Waseem
ISO_TC_176_SC2_N1286_Guidance_on_the_req.pdfISO_TC_176_SC2_N1286_Guidance_on_the_req.pdf
ISO_TC_176_SC2_N1286_Guidance_on_the_req.pdf
Haris Waseem4 vues
ISO 27001 2002 Update Webinar.pdf par ControlCase
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
ControlCase1.6K vues
ISO 27002 2013 Atualizações / mudanças par Fernando Palma
ISO 27002 2013 Atualizações / mudanças ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças
Fernando Palma2K vues

Plus de Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001

ISO Survey 2022: ISO 27001 certificates (ISMS) par
ISO Survey 2022: ISO 27001 certificates (ISMS)ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
532 vues10 diapositives
Cybersecurity Frameworks for DMZCON23 230905.pdf par
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
643 vues22 diapositives
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes par
My 15 Years of Experience in Using Mind Maps for Business and Personal PurposesMy 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal PurposesAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
680 vues22 diapositives
From NIST CSF 1.1 to 2.0.pdf par
From NIST CSF 1.1 to 2.0.pdfFrom NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdfAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
756 vues22 diapositives
ISO 27001 How to use the ISMS Implementation Toolkit.pdf par
ISO 27001 How to use the ISMS Implementation Toolkit.pdfISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdfAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
219 vues60 diapositives

Plus de Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001(20)

Dernier

Top 10 Strategic Technologies in 2024: AI and Automation par
Top 10 Strategic Technologies in 2024: AI and AutomationTop 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and AutomationAutomationEdge Technologies
14 vues14 diapositives
Voice Logger - Telephony Integration Solution at Aegis par
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at AegisNirmal Sharma
17 vues1 diapositive
handbook for web 3 adoption.pdf par
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdfLiveplex
19 vues16 diapositives
ChatGPT and AI for Web Developers par
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web DevelopersMaximiliano Firtman
181 vues82 diapositives
Piloting & Scaling Successfully With Microsoft Viva par
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaRichard Harbridge
10 vues160 diapositives
1st parposal presentation.pptx par
1st parposal presentation.pptx1st parposal presentation.pptx
1st parposal presentation.pptxi238212
9 vues3 diapositives

Dernier(20)

Voice Logger - Telephony Integration Solution at Aegis par Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma17 vues
handbook for web 3 adoption.pdf par Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex19 vues
Piloting & Scaling Successfully With Microsoft Viva par Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
1st parposal presentation.pptx par i238212
1st parposal presentation.pptx1st parposal presentation.pptx
1st parposal presentation.pptx
i2382129 vues
Empathic Computing: Delivering the Potential of the Metaverse par Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors par sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab15 vues
Case Study Copenhagen Energy and Business Central.pdf par Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana12 vues
Five Things You SHOULD Know About Postman par Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman27 vues
PharoJS - Zürich Smalltalk Group Meetup November 2023 par Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi120 vues
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive par Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
From chaos to control: Managing migrations and Microsoft 365 with ShareGate! par sammart93
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
sammart939 vues
Attacking IoT Devices from a Web Perspective - Linux Day par Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 vues
Business Analyst Series 2023 - Week 3 Session 5 par DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10209 vues
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... par James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson33 vues

ISO 27001:2022 What has changed.pdf

  • 1. ISO 27001:2022. What has changed? by Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001 www.patreon.com/AndreyProzorov 1.0, 25.10.2022
  • 2. Agenda 2 1. Purchasing 2. Life cycle 3. New Name 4. Abstract 5. Number of pages 6. New terminology databases 7. New relevant requirements, 4.2 8. More focus on processses, 4.4 ISMS 9. New requirements for 6.2 IS objectives 10. Planning for changes (NEW) 11. New requirements for 7.4 Communication 12. New requirements for 8.1 Planning 13. New requirements for 9.1 Monitoring 14. New structure of 9.2 and 9.3, and a new input for Management Review 15. New structure of 10 Improvement 16. NEW Annex A. IS Controls 17. IS Control list and Mapping 18. ISO 27002:2022. Example of Attributes 19. If you have the ISMS, you will need to do 20. Contacts
  • 5. 1. New Name 5 ISO/IEC 27001:2013 ISO/IEC 27001:2022 Information technology — Security techniques — Information security management systems — Requirements Information security, cybersecurity and privacy protection — Information security management systems — Requirements
  • 6. This document specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. This document also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in this document are generic and are intended to be applicable to all organizations, regardless of type, size or nature. Excluding any of the requirements specified in Clauses 4 to 10 is not acceptable when an organization claims conformity to this document. [New 2022] 6 2. Abstract
  • 7. 3. Number of pages 7 ISO/IEC 27001:2013 ISO/IEC 27001:2022 23 19
  • 8. 4. New terminology databases 8 ISO/IEC 27001:2013 ISO/IEC 27001:2022 3 Terms and definitions For the purposes of this document, the terms and definitions given in ISO/IEC 27000 apply. 3 Terms and definitions For the purposes of this document, the terms and definitions given in ISO/IEC 27000 apply. ISO and IEC maintain terminology databases for use in standardization at the following addresses: — ISO Online browsing platform: available at https://www.iso.org/obp — IEC Electropedia: available at https://www.electropedia.org
  • 9. 5. New relevant requirements, 4.2 9 ISO/IEC 27001:2013 ISO/IEC 27001:2022 4.2 Understanding the needs and expectations of interested parties The organization shall determine: a) interested parties that are relevant to the information security management system; and b) the requirements of these interested parties relevant to information security. 4.2 Understanding the needs and expectations of interested parties The organization shall determine: a) interested parties that are relevant to the information security management system; b) the relevant requirements of these interested parties; c) which of these requirements will be addressed through the information security management system.
  • 10. 6. More focus on processses, 4.4 ISMS 10 ISO/IEC 27001:2013 ISO/IEC 27001:2022 4.4 Information security management system The organization shall establish, implement, maintain and continually improve an information security management system, in accordance with the requirements of this International Standard. 4.4 Information security management system The organization shall establish, implement, maintain and continually improve an information security management system, including the processes needed and their interactions, in accordance with the requirements of this document.
  • 11. 7. New requirements for 6.2 IS objectives 11 ISO/IEC 27001:2013 ISO/IEC 27001:2022 6.2 Information security objectives and planning to achieve them The organization shall establish information security objectives at relevant functions and levels. The information security objectives shall: a) be consistent with the information security policy; b) be measurable (if practicable); c) take into account applicable information security requirements, and results from risk assessment and risk treatment; d) be communicated; and e) be updated as appropriate. 6.2 Information security objectives and planning to achieve them The organization shall establish information security objectives at relevant functions and levels. The information security objectives shall: a) be consistent with the information security policy; b) be measurable (if practicable); c) take into account applicable information security requirements, and results from risk assessment and risk treatment; d) be monitored; e) be communicated; f) be updated as appropriate; g) be available as documented information.
  • 12. 8. Planning for changes (NEW) 12 ISO/IEC 27001:2013 ISO/IEC 27001:2022 - 6.3 Planning of changes When the organization determines the need for changes to the information security management system, the changes shall be carried out in a planned manner.
  • 13. 9. New requirements for 7.4 Communication 13 ISO/IEC 27001:2013 ISO/IEC 27001:2022 7.4 Communication The organization shall determine the need for internal and external communications relevant to the information security management system including: a) on what to communicate; b) when to communicate; c) with whom to communicate; d) who shall communicate; and e) the processes by which communication shall be effected. 7.4 Communication The organization shall determine the need for internal and external communications relevant to the information security management system including: a) on what to communicate; b) when to communicate; c) with whom to communicate; d) how to communicate.
  • 14. 10. New requirements for 8.1 Planning 14 ISO/IEC 27001:2013 ISO/IEC 27001:2022 8.1 Operational planning and control The organization shall plan, implement and control the processes needed to meet information security requirements, and to implement the actions determined in 6.1. The organization shall also implement plans to achieve information security objectives determined in 6.2. The organization shall keep documented information to the extent necessary to have confidence that the processes have been carried out as planned. The organization shall control planned changes and review the consequences of unintended changes, taking action to mitigate any adverse effects, as necessary. The organization shall ensure that outsourced processes are determined and controlled. 8.1 Operational planning and control The organization shall plan, implement and control the processes needed to meet requirements, and to implement the actions determined in Clause 6, by: — establishing criteria for the processes; — implementing control of the processes in accordance with the criteria. Documented information shall be available to the extent necessary to have confidence that the processes have been carried out as planned. The organization shall control planned changes and review the consequences of unintended changes, taking action to mitigate any adverse effects, as necessary. The organization shall ensure that externally provided processes, products or services that are relevant to the information security management system are controlled.
  • 15. 11. New requirements for 9.1 Monitoring 15 ISO/IEC 27001:2013 ISO/IEC 27001:2022 9.1 Monitoring, measurement, analysis and evaluation … The organization shall retain appropriate documented information as evidence of the monitoring and measurement results. 9.1 Monitoring, measurement, analysis and evaluation … Documented information shall be available as evidence of the results. The organization shall evaluate the information security performance and the effectiveness of the information security management system.
  • 16. 12. New structure of 9.2 and 9.3 16 ISO/IEC 27001:2013 ISO/IEC 27001:2022 9.2 Internal audit 9.3 Management review 9.2 Internal audit 9.2.1 General 9.2.2 Internal audit programme 9.3 Management review 9.3.1 General 9.3.2 Management review inputs 9.3.3 Management review results +new input for Management review: c) changes in needs and expectations of interested parties that are relevant to the information security management system
  • 17. 13. New structure of 10 Improvement 17 ISO/IEC 27001:2013 ISO/IEC 27001:2022 10.1 Nonconformity and corrective action 10.2 Continual improvement 10.1 Continual improvement 10.2 Nonconformity and corrective action
  • 18. 14. NEW Annex A. IS Controls 18
  • 19. Information security controls reference (Annex A) 19 ISO/IEC 27001:2013 ISO/IEC 27001:2022 Total number of controls – 114 Total number of controls – 93, 11 new Domains: A.5 Information security policies A.6 Organisation of information security A.7 Human resource security A.8 Asset management A.9 Access control A.10 Cryptography A.11 Physical and environmental security A.12 Operations security A.13 Communications security A.14 System acquisition, development, and maintenance A.15 Supplier relationships A.16 Information security incident management A.17 Information security aspects of business continuity management A.18 Compliance Controls are categorized as: a) People, if they concern individual people b) Physical, if they concern physical objects c) Technological, if they concern technology d) otherwise they are categorized as Organizational Five attributes only in ISO 27002:2022 (#): 1. Control type (Preventive, Detective, Corrective) 2. Information security properties (CIA) 3. Cybersecurity concepts (Identify, Protect, Detect, Respond and Recover) 4. Operational capabilities 5. Security domains
  • 20. 20
  • 21. 21 NEW 2022: A.5.7 Threat intelligence A.5.23 Information security for use of cloud services A.5.30 ICT readiness for business continuity A.7.4 Physical security monitoring A.8.9 Configuration management A.8.10 Information deletion A.8.11 Data masking A.8.12 Data leakage prevention A.8.16 Monitoring activities A.8.23 Web filtering A.8.28 Secure coding www.patreon.com/posts/iso-27001-2013-73584456
  • 22. ISO 27002:2022. Example of Attributes 22
  • 23. If you have the ISMS, you will need to do: 1. Review the Risk Treatment Plan (RTP), align it with the new structure and numbering of controls. 2. Review and update the Statement of Applicability (SoA). I recommend using 2 spreadsheets (2013 and 2022) in the next 1-2 years. 3. Review and update the ISMS Management review procedure (inputs). 4. Review and update IS objectives and the Monitoring, measurement, analysis and evaluation procedure. 5. Review and update the ISMS Communication Plan. 6. Review and update other policies, standards and procedures (if necessary). 7. Review and update checklists and questionnaires used for audits (internal and external). 8. Evaluate and possibly adapt third-party security tools (e.g., GRC, SIEM, VM) to ensure the records you are using to demonstrate compliance support the new requirements. 23
  • 25. My ISMS Implementation Toolkit (ISO 27001) 25 www.patreon.com/posts/47806655