SlideShare une entreprise Scribd logo
1  sur  11
iFour ConsultancyISMS Framework: Clause 4 - Context of the organization
Organizational Context - ISMS requirements
The organizational context for implementing and achieving the intended
outcome of its ISMS includes:
Organizational Background
Context of the Operations
Purpose
 ISO 27001:2013 has classified the organizational context into:
Clause 4.1: Understanding the organization and its context.
Clause 4.2: Understanding the needs and expectations of interested parties.
Clause 4.3: Determining the scope of ISMS.
Clause 4.4: Information Security Management System.
Offshore software development company Indiahttp://www.ifourtechnolab.com
Clause 4.1 Understanding the organization & its context
 Organization should determine the internal and external issues pertaining to the
implementation of ISMS.
 Internal issues can be described in terms of:
 Internal & External issues can be identified by:
SWOT analysis
 Image reference: https://www.fullestop.com/blog/analyze-website-swot-analysis/
 Organizational structure  Processes
 Policies  Internal practices
 People (i.e. Resources)  Products
 Objectives  Capabilities
Offshore software development company Indiahttp://www.ifourtechnolab.com
External issues can be described in terms of:
External issues can be determined by:
PESTLE analysis
Clause 4.1 (Continued)
 Market competitors  Differentiators of products
 Trends  Environmental aspects
 Clients  Legal & Regulatory commitments
 Relationship (with
supplier/vendor/client)
 External stakeholders
Political
Economic
Social
Technological
Legal
Environmental
Offshore software development company Indiahttp://www.ifourtechnolab.com
The context also refers to Clause 5.3 of ISO 31000:2009 standard for
establishing internal and external context of the organization.
Clause 5.3 of ISO 31000:2009 explains the establishment of your unique risk
management context. The subsections are:
Clause 5.3.1: Establish your risk management parameters.
Clause 5.3.2: Establish your organization's external context.
Clause 5.3.3: Establish your organization’s internal context.
Clause 5.3.4: Establish the context of your risk management process.
Clause 5.3.5: Establish your organization’s risk criteria.
Clause 4.1 (Continued)
Offshore software development company Indiahttp://www.ifourtechnolab.com
Clause 4.2 Needs and expectations of interested parties
The organization shall determine:
Interested parties relevant to ISMS.
Requirements of these Interested parties relevant to ISMS.
Interested parties are the stakeholders that influence ISMS operations or they
are the ones who are affected by ISMS activities.
Interested parties can be any from the following:
The requirements of these interested parties includes legal and regulatory
requirements and obligations as mentioned in the contract.
 Clients  Suppliers/Vendors
 Govt. agencies/Regulators  Partners
 Employees  Shareholders/Owners
Offshore software development company Indiahttp://www.ifourtechnolab.com
Clause 4.2 (Continued)
Examples of requirements by some of the entities mentioned ahead:
Shareholders of your company want their investment to be secure and they want to
earn a good return on their investment.
 Image reference: http://www.consilue.com/
Clients want your company to comply with the security clauses in the contracts your
company signs with them.
 Image reference: http://imgforu.com/login/123?q=39
Govt. agencies want your company to comply with Information Security laws and
regulations.
 Image reference: http://blog.snobmonkey.com/2015/04/14/why-universities-need-to-get-social/
Offshore software development company Indiahttp://www.ifourtechnolab.com
The organization shall determine the boundaries and applicability of the
areas of information security system to establish its scope
The scope is determined keeping in mind these factors:
The internal and the external issues referred to in Clause 4.1
The requirements of interested parties referred to in Clause 4.2
The interfaces and dependencies between activities performed by the organization, and
those that are performed by other organizations
 The boundary is the term that considers the organization processes in relevance to
information security.
 Image reference: http://www.huntinggpsmaps.com/hunt-map-update-overview
Clause 4.3 Determining the scope of ISMS
Offshore software development company Indiahttp://www.ifourtechnolab.com
Clause 4.3 (Continued)
An organization should identify the functions that are provided by the
organization itself and also the functions that are provided by external parties
which affect the CIA of information within the scope of ISMS.
Example:
A social networking company relies on its internet service provider. If a failure occurs in
providing internet to the social networking site of the company by the internet provider,
then availability of the information is compromised. Hence the internet service should
be considered while determining the scope of ISMS.
 ISO states that the scope of ISMS should be available as documented information
Offshore software development company Indiahttp://www.ifourtechnolab.com
•Maintain the
ISMS i.e. Monitor
and Review ISMS
•Continually
Improve the ISMS
•Implement and
operate the ISMS
•Establish the ISMS
Plan Do
CheckAct
Clause 4.4 Information Security Management System
Offshore software development company Indiahttp://www.ifourtechnolab.com
References
https://wings2i.wordpress.com/2014/10/09/what-is-context-of-the-
organization-for-iso-270012013/
http://www.aisgcorp.com/how-to-comply-with-clause-4-1-and-4-2-of-isoiec-
270012013/
http://www.slideshare.net/ULDQSInc/iso-27001-transition-to-2013-
03202014
http://advisera.com/27001academy/knowledgebase/explanation-iso-
270012013-clause-4-1-understanding-organization/
http://advisera.com/27001academy/knowledgebase/how-to-identify-
interested-parties-according-to-iso-27001-and-iso-22301/
Offshore software development company Indiahttp://www.ifourtechnolab.com

Contenu connexe

Tendances

ISMS Part I
ISMS Part IISMS Part I
ISMS Part Ikhushboo
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMSAkhil Garg
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001Imran Ahmed
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsUppala Anand
 
ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesCertification Europe
 
ISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxforam74
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
ISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfSerkanRafetHalil1
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001CUNIX INDIA
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementationRalf Braga
 

Tendances (20)

27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and Challenges
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
 
ISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdfISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdf
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
ISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptxISO_ 27001:2022 Controls & Clauses.pptx
ISO_ 27001:2022 Controls & Clauses.pptx
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
ISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdf
 
Iso 27001 2013
Iso 27001 2013Iso 27001 2013
Iso 27001 2013
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 

Similaire à Organizational Context ISMS Framework

A Software Requirements Specification
A Software Requirements SpecificationA Software Requirements Specification
A Software Requirements Specificationadil raja
 
ISO 27001 management clause 7 support - by software development company in india
ISO 27001 management clause 7 support - by software development company in indiaISO 27001 management clause 7 support - by software development company in india
ISO 27001 management clause 7 support - by software development company in indiaiFour Consultancy
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
The Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignmeThe Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignmejacvzpline
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaiFour Consultancy
 
Software Requirements Specification for GBI information system dev.docx
Software Requirements Specification for GBI information system dev.docxSoftware Requirements Specification for GBI information system dev.docx
Software Requirements Specification for GBI information system dev.docxrronald3
 
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxThe Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxteresehearn
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxgasciognecaren
 
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docxTerm Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docxjacqueliner9
 
The Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docxThe Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docxoreo10
 
Term Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDTerm Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDalehosickg3
 
Microsoft compliance framework_for_online_services
Microsoft compliance framework_for_online_servicesMicrosoft compliance framework_for_online_services
Microsoft compliance framework_for_online_services~Eric Principe
 
Microsoft compliance framework_for_online_services
Microsoft compliance framework_for_online_servicesMicrosoft compliance framework_for_online_services
Microsoft compliance framework_for_online_services~Eric Principe
 
The Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poiThe Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poijacvzpline
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxtodd271
 
Research Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxResearch Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxgholly1
 
Tugas control & audit sistem informasi
Tugas control & audit sistem informasiTugas control & audit sistem informasi
Tugas control & audit sistem informasiNur Fatrianti
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft CorpAntoinette Williams
 

Similaire à Organizational Context ISMS Framework (20)

A Software Requirements Specification
A Software Requirements SpecificationA Software Requirements Specification
A Software Requirements Specification
 
Sandingan ISO/IEC 27001 SMKI vs ISO 37001 SMAP
Sandingan ISO/IEC 27001 SMKI vs ISO 37001 SMAPSandingan ISO/IEC 27001 SMKI vs ISO 37001 SMAP
Sandingan ISO/IEC 27001 SMKI vs ISO 37001 SMAP
 
ISO 27001 management clause 7 support - by software development company in india
ISO 27001 management clause 7 support - by software development company in indiaISO 27001 management clause 7 support - by software development company in india
ISO 27001 management clause 7 support - by software development company in india
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
The Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignmeThe Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignme
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in india
 
Software Requirements Specification for GBI information system dev.docx
Software Requirements Specification for GBI information system dev.docxSoftware Requirements Specification for GBI information system dev.docx
Software Requirements Specification for GBI information system dev.docx
 
Is.iso.pas.17002.2004[1]
Is.iso.pas.17002.2004[1]Is.iso.pas.17002.2004[1]
Is.iso.pas.17002.2004[1]
 
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxThe Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
 
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docxTerm Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
 
The Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docxThe Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docx
 
Term Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDTerm Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerD
 
Microsoft compliance framework_for_online_services
Microsoft compliance framework_for_online_servicesMicrosoft compliance framework_for_online_services
Microsoft compliance framework_for_online_services
 
Microsoft compliance framework_for_online_services
Microsoft compliance framework_for_online_servicesMicrosoft compliance framework_for_online_services
Microsoft compliance framework_for_online_services
 
The Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poiThe Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poi
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
 
Research Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxResearch Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docx
 
Tugas control & audit sistem informasi
Tugas control & audit sistem informasiTugas control & audit sistem informasi
Tugas control & audit sistem informasi
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft Corp
 

Dernier

Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 

Organizational Context ISMS Framework

  • 1. iFour ConsultancyISMS Framework: Clause 4 - Context of the organization
  • 2. Organizational Context - ISMS requirements The organizational context for implementing and achieving the intended outcome of its ISMS includes: Organizational Background Context of the Operations Purpose  ISO 27001:2013 has classified the organizational context into: Clause 4.1: Understanding the organization and its context. Clause 4.2: Understanding the needs and expectations of interested parties. Clause 4.3: Determining the scope of ISMS. Clause 4.4: Information Security Management System. Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 3. Clause 4.1 Understanding the organization & its context  Organization should determine the internal and external issues pertaining to the implementation of ISMS.  Internal issues can be described in terms of:  Internal & External issues can be identified by: SWOT analysis  Image reference: https://www.fullestop.com/blog/analyze-website-swot-analysis/  Organizational structure  Processes  Policies  Internal practices  People (i.e. Resources)  Products  Objectives  Capabilities Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 4. External issues can be described in terms of: External issues can be determined by: PESTLE analysis Clause 4.1 (Continued)  Market competitors  Differentiators of products  Trends  Environmental aspects  Clients  Legal & Regulatory commitments  Relationship (with supplier/vendor/client)  External stakeholders Political Economic Social Technological Legal Environmental Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 5. The context also refers to Clause 5.3 of ISO 31000:2009 standard for establishing internal and external context of the organization. Clause 5.3 of ISO 31000:2009 explains the establishment of your unique risk management context. The subsections are: Clause 5.3.1: Establish your risk management parameters. Clause 5.3.2: Establish your organization's external context. Clause 5.3.3: Establish your organization’s internal context. Clause 5.3.4: Establish the context of your risk management process. Clause 5.3.5: Establish your organization’s risk criteria. Clause 4.1 (Continued) Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 6. Clause 4.2 Needs and expectations of interested parties The organization shall determine: Interested parties relevant to ISMS. Requirements of these Interested parties relevant to ISMS. Interested parties are the stakeholders that influence ISMS operations or they are the ones who are affected by ISMS activities. Interested parties can be any from the following: The requirements of these interested parties includes legal and regulatory requirements and obligations as mentioned in the contract.  Clients  Suppliers/Vendors  Govt. agencies/Regulators  Partners  Employees  Shareholders/Owners Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 7. Clause 4.2 (Continued) Examples of requirements by some of the entities mentioned ahead: Shareholders of your company want their investment to be secure and they want to earn a good return on their investment.  Image reference: http://www.consilue.com/ Clients want your company to comply with the security clauses in the contracts your company signs with them.  Image reference: http://imgforu.com/login/123?q=39 Govt. agencies want your company to comply with Information Security laws and regulations.  Image reference: http://blog.snobmonkey.com/2015/04/14/why-universities-need-to-get-social/ Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 8. The organization shall determine the boundaries and applicability of the areas of information security system to establish its scope The scope is determined keeping in mind these factors: The internal and the external issues referred to in Clause 4.1 The requirements of interested parties referred to in Clause 4.2 The interfaces and dependencies between activities performed by the organization, and those that are performed by other organizations  The boundary is the term that considers the organization processes in relevance to information security.  Image reference: http://www.huntinggpsmaps.com/hunt-map-update-overview Clause 4.3 Determining the scope of ISMS Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 9. Clause 4.3 (Continued) An organization should identify the functions that are provided by the organization itself and also the functions that are provided by external parties which affect the CIA of information within the scope of ISMS. Example: A social networking company relies on its internet service provider. If a failure occurs in providing internet to the social networking site of the company by the internet provider, then availability of the information is compromised. Hence the internet service should be considered while determining the scope of ISMS.  ISO states that the scope of ISMS should be available as documented information Offshore software development company Indiahttp://www.ifourtechnolab.com
  • 10. •Maintain the ISMS i.e. Monitor and Review ISMS •Continually Improve the ISMS •Implement and operate the ISMS •Establish the ISMS Plan Do CheckAct Clause 4.4 Information Security Management System Offshore software development company Indiahttp://www.ifourtechnolab.com

Notes de l'éditeur

  1. Offshore software development company India – http://www.ifourtechnolab.com
  2. Offshore software development company India – http://www.ifourtechnolab.com
  3. Offshore software development company India – http://www.ifourtechnolab.com
  4. Offshore software development company India – http://www.ifourtechnolab.com
  5. Offshore software development company India – http://www.ifourtechnolab.com
  6. Offshore software development company India – http://www.ifourtechnolab.com
  7. Offshore software development company India – http://www.ifourtechnolab.com
  8. Offshore software development company India – http://www.ifourtechnolab.com
  9. Offshore software development company India – http://www.ifourtechnolab.com
  10. Offshore software development company India – http://www.ifourtechnolab.com
  11. Offshore software development company India – http://www.ifourtechnolab.com