SlideShare une entreprise Scribd logo
1  sur  17
ISO 27001 and ISO
     27002:2005
INFORMATION SECURITY MANAGEMENT
          SYSTEMS(ISMS)




   Dr Muliaro J Wafula PhD,FCCS
Aims/objectives
1.    Introduction
2.    Info security stds
     ◦ Clauses
     ◦ Control objectives
     ◦ controls
3.    ISMS Implementation using PDCA
      Model



                            Dr Muliaro-ISMS   2
Information Security (IS) Defn
   Why IS?
    1.  Ensure business continuity
    2.  Reduce/prevent damage on business
    3.  Ensure preservation of confidentiality, integrity and
        availability of info. Also authenticity , accountability,
        non-repudation and reliability enhanced.
    4. Interconnection of networks pose risk
    5. Trends in distributed computing
    6. Participation of customers/employees/stakeholder
    7. Marketing of products/services
    8. Internal management tool-for control & confidence
    9. Dependence on Info systems-vulnerable to IS
        threats
    10. Information, systems & networks are key business
        assets
                                      Dr Muliaro-ISMS               3
Information Security
Management System (ISMS)
 Defination:-
 that part of overall magmt
  system, based on business risk
  approach, to
  establish, implement, operate, monitor
  , review, maintain and improve info
  security.
 A management process with 3 key
  components:
    ◦ Confidentiality-available to authorized
      only
    ◦ Integrity-accurate and complete
                              Dr Muliaro-ISMS   4
Information Types
 Internal
 Public
 Private
 Customer/client
 Shared etc




                    Dr Muliaro-ISMS   5
Info security risks
   Info theft
   Intrusion and subversion of system
    resources
   Denial of services
   Loss
   Corruption
   Masquerade
   Paper document
   What are the most common IS mistakes
    made by individuals?
                        Dr Muliaro-ISMS    6
Common IS mistakes
1.   Unattended comp.       1.     Loose talk about
     left on                       p/word in public
2.   Bad password           2.     Getting into rush &
     etiquette-no default          bypassing key
3.   Laptops stolen                security measures
4.   Keeping p/words        3.     Vague knowledge
     on post-it notes              of security policy
5.   Opening e-mail         4.     Non-reporting of
     attachments from              security violations
     strangers              5.     Late in updating
                            6.     Check in/out
                                   workers ethics


                                 Dr Muliaro-ISMS         7
Selection of Controls
 Its expenditure need to balance
  against business harm/risk
 Common ones include:
    ◦ Data protection and privacy of personal
      information (15.1.4)
    ◦ Protection of org. records (15.1.3)
    ◦ Intellectual property rights (15.1.2)
    ◦ Information security policy document
      (5.1.1)
    ◦ Business continuity mgt (14) etc
                            Dr Muliaro-ISMS     8
ISO 27002:2005
 Provides guidance on best practices
  for ISM
 Prime objectives are:
    ◦ A common basis for organizations
    ◦ Build confidence in inter-organizational
      dealings
   It defines a set of control objectives,
    controls and implementation guidance.


                             Dr Muliaro-ISMS     9
ISO 27001:2005
 Specifies requirements for
  establishing, implementing, operating,
  monitoring, reviewing, maintaining,
  and improving a documented ISMS
 Its designed to ensure adequate
  security controls to protect info assets,
  and documenting ISMS
 Applicable for assessment and
  certification
                         Dr Muliaro-ISMS   10
Clauses
 Clause 4-8 are mandatory.
 How would you ensure that
  management:
    ◦ Management is committed to IS?
    ◦ Establishes roles and responsibilities for
      IS?
    ◦ Provides training, awareness and
      competency?
    ◦ Carry out review of the ISMS?

                             Dr Muliaro-ISMS       11
PDCA Model: Establishment &
Mgmt of ISMS (plan)
1.    Scope and boundaries
2.    Policy/objectives
3.    Define risk assessment approach
4.    Identify risk
5.    Analyse and evaluate risks
6.    Identify and evaluate options of risk
      treatment
7.    Select control objectives and controls
8.    Obtain mgmt approval on residual risk
9.    Obtain mgmt authorization to implement
      and operate the ISMS
10.   Prepare statement of applicability
                             Dr Muliaro-ISMS   12
PDCA Model: Implementation &
Operation of ISMS (Do)
1.   Formulate risk treatment plan
2.   Implement risk treatment plan
3.   Define how to measure effectiveness of
     selected controls
4.   Implement controls selected to meet
     control objectives
5.   Implement training and awareness
6.   Manage operations and resources
7.   Implement procedures and other
     controls
                          Dr Muliaro-ISMS   13
PDCA Model: Monitoring &
reviewing of ISMS (Check)
1.   Execute monitoring procedures and other
     controls
2.   Undertake regular reviews of the
     effectiveness of ISMS
3.   Measure effectiveness of controls
4.   Review risks assessments at planned
     intervals
5.   Review level of residual risk and identified
     acceptable risk
6.   Internal ISMS audit/magmt review
7.   Update security plans
8.   Records actions and events
                              Dr Muliaro-ISMS       14
PDCA Model: Maintaining &
Improving of ISMS (ACT)
1.   Implement identified improvements
2.   Take appropriate corrective and
     preventive actions
3.   Communicate the actions and
     improvements
4.   Ensure improvements achieve
     intended objectives



                        Dr Muliaro-ISMS   15
ISMS Critical Success
Factors
1.    Info security policy, objectives, and activities that reflect
      business objectives
2.    An approach and framework to implementing, maintaining,
      monitoring, and improving IS that is consistent with org.
      culture
3.    Visible support and commitment from all levels of
      management
4.    A good understanding of the information security
      requirements, risk assessment, and risk management.
5.    Effective marketing of IS to all managers, employees, and
      other parties to achieve awareness
6.    Distribution of guidance on IS policy and std to all
      managers/employees/stakeholders
7.    Funding IS management activites
8.    Providing appropriate awareness , training, and education
9.    Establishment of an effective IS incident mgmt process
10.   Implementation of a measurement system for performance
      in IS mgmt and feedback info for improvment
                                        Dr Muliaro-ISMS               16
JKUAT Information Security Policy
(JISP)


   The specific objectives of information security
    are to:
    ◦ Protect information resources from unauthorized
      access;
    ◦ Ensure the continuity of systems processing
      services;
    ◦ Guarantee the privacy and accuracy of
      information resources;
    ◦ Allow proper restoration of the functionality of
      damaged resources;
    ◦ Prevent and detect possible threats, violations
      and security incidents
                                Dr Muliaro-ISMS          17

Contenu connexe

Tendances

ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 

Tendances (20)

Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
ISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptxISO 27001 Awareness/TRansition.pptx
ISO 27001 Awareness/TRansition.pptx
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
ISO/IEC 27001:2013
ISO/IEC 27001:2013ISO/IEC 27001:2013
ISO/IEC 27001:2013
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 

En vedette

Information security management system
Information security management systemInformation security management system
Information security management system
Arani Srinivasan
 
Mr. ahmed obaid the ceo guide to implement iso 27001
Mr. ahmed obaid   the ceo guide to implement iso 27001Mr. ahmed obaid   the ceo guide to implement iso 27001
Mr. ahmed obaid the ceo guide to implement iso 27001
qualitysummit
 

En vedette (20)

Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Information security-management-system
Information security-management-systemInformation security-management-system
Information security-management-system
 
Iso 27000 it management systems presentation peter greenham iigi fwr group i...
Iso 27000 it management systems  presentation peter greenham iigi fwr group i...Iso 27000 it management systems  presentation peter greenham iigi fwr group i...
Iso 27000 it management systems presentation peter greenham iigi fwr group i...
 
Mr. ahmed obaid the ceo guide to implement iso 27001
Mr. ahmed obaid   the ceo guide to implement iso 27001Mr. ahmed obaid   the ceo guide to implement iso 27001
Mr. ahmed obaid the ceo guide to implement iso 27001
 
All you wanted to know about iso 27000
All you wanted to know about iso 27000All you wanted to know about iso 27000
All you wanted to know about iso 27000
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
ISO 27002 Foundation ISFS
ISO 27002 Foundation ISFSISO 27002 Foundation ISFS
ISO 27002 Foundation ISFS
 
Nuevos retos CIO
Nuevos retos CIONuevos retos CIO
Nuevos retos CIO
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
 
Jurnal rangkuman
Jurnal rangkumanJurnal rangkuman
Jurnal rangkuman
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças ISO 27002 2013 Atualizações / mudanças
ISO 27002 2013 Atualizações / mudanças
 
Isms Implementer Course Module 1 Introduction To Information Security
Isms Implementer Course   Module 1   Introduction To Information SecurityIsms Implementer Course   Module 1   Introduction To Information Security
Isms Implementer Course Module 1 Introduction To Information Security
 
The Latest in Cloud Computing Standards
The Latest in Cloud Computing StandardsThe Latest in Cloud Computing Standards
The Latest in Cloud Computing Standards
 
PKI in Korea
PKI in KoreaPKI in Korea
PKI in Korea
 
IT Career Opportunities
IT Career OpportunitiesIT Career Opportunities
IT Career Opportunities
 
Splunk guide for_iso_27002
Splunk guide for_iso_27002Splunk guide for_iso_27002
Splunk guide for_iso_27002
 
Tutorial membuat Public Key Infrastructure
Tutorial membuat Public Key InfrastructureTutorial membuat Public Key Infrastructure
Tutorial membuat Public Key Infrastructure
 
Pki and OpenSSL
Pki and OpenSSLPki and OpenSSL
Pki and OpenSSL
 

Similaire à Information Security Management Systems(ISMS) By Dr Wafula

Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
sdfghj21
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
AbuHanifah59
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docxCHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
robertad6
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
Swati Gupta
 
Rob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcm
Robert Kloots
 
ISO_27001___2005_OASIS
ISO_27001___2005_OASISISO_27001___2005_OASIS
ISO_27001___2005_OASIS
Dermot Clarke
 
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docxSafety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
rtodd599
 

Similaire à Information Security Management Systems(ISMS) By Dr Wafula (20)

A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Isms info
Isms infoIsms info
Isms info
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docxCHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
Rob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcm
 
ISO_27001___2005_OASIS
ISO_27001___2005_OASISISO_27001___2005_OASIS
ISO_27001___2005_OASIS
 
Iso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consultingIso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consulting
 
DR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptxDR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptx
 
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitThe Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
 
02. ISM - Cyber Security Principles (March 2023).pdf
02. ISM - Cyber Security Principles (March 2023).pdf02. ISM - Cyber Security Principles (March 2023).pdf
02. ISM - Cyber Security Principles (March 2023).pdf
 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docxSafety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
Safety Management System1SMS-1Jeffrey D Carpenter, CSP.docx
 

Plus de Discover JKUAT

Paper on entrepreneurship and organization performance - Samule Obino Mokaya
Paper on entrepreneurship and organization performance - Samule Obino MokayaPaper on entrepreneurship and organization performance - Samule Obino Mokaya
Paper on entrepreneurship and organization performance - Samule Obino Mokaya
Discover JKUAT
 
Project control tools by Samuel obino mokaya
Project control tools by Samuel obino mokayaProject control tools by Samuel obino mokaya
Project control tools by Samuel obino mokaya
Discover JKUAT
 
Paper on risk management by Samuel Obino Mokaya
Paper on risk management by Samuel Obino MokayaPaper on risk management by Samuel Obino Mokaya
Paper on risk management by Samuel Obino Mokaya
Discover JKUAT
 
Paper on intrepreneurship and organization performance by Samuel Obino Mokaya
Paper on intrepreneurship and organization performance by Samuel Obino MokayaPaper on intrepreneurship and organization performance by Samuel Obino Mokaya
Paper on intrepreneurship and organization performance by Samuel Obino Mokaya
Discover JKUAT
 
Implementing Business Continuity With The Bs25999 Standard By Dennis
Implementing Business Continuity With The Bs25999 Standard By DennisImplementing Business Continuity With The Bs25999 Standard By Dennis
Implementing Business Continuity With The Bs25999 Standard By Dennis
Discover JKUAT
 

Plus de Discover JKUAT (6)

Paper on entrepreneurship and organization performance - Samule Obino Mokaya
Paper on entrepreneurship and organization performance - Samule Obino MokayaPaper on entrepreneurship and organization performance - Samule Obino Mokaya
Paper on entrepreneurship and organization performance - Samule Obino Mokaya
 
Project control tools by Samuel obino mokaya
Project control tools by Samuel obino mokayaProject control tools by Samuel obino mokaya
Project control tools by Samuel obino mokaya
 
Paper on risk management by Samuel Obino Mokaya
Paper on risk management by Samuel Obino MokayaPaper on risk management by Samuel Obino Mokaya
Paper on risk management by Samuel Obino Mokaya
 
Paper on intrepreneurship and organization performance by Samuel Obino Mokaya
Paper on intrepreneurship and organization performance by Samuel Obino MokayaPaper on intrepreneurship and organization performance by Samuel Obino Mokaya
Paper on intrepreneurship and organization performance by Samuel Obino Mokaya
 
Project monitoring and evaluation by Samuel Obino Mokaya
Project monitoring and evaluation by Samuel Obino MokayaProject monitoring and evaluation by Samuel Obino Mokaya
Project monitoring and evaluation by Samuel Obino Mokaya
 
Implementing Business Continuity With The Bs25999 Standard By Dennis
Implementing Business Continuity With The Bs25999 Standard By DennisImplementing Business Continuity With The Bs25999 Standard By Dennis
Implementing Business Continuity With The Bs25999 Standard By Dennis
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Information Security Management Systems(ISMS) By Dr Wafula

  • 1. ISO 27001 and ISO 27002:2005 INFORMATION SECURITY MANAGEMENT SYSTEMS(ISMS) Dr Muliaro J Wafula PhD,FCCS
  • 2. Aims/objectives 1. Introduction 2. Info security stds ◦ Clauses ◦ Control objectives ◦ controls 3. ISMS Implementation using PDCA Model Dr Muliaro-ISMS 2
  • 3. Information Security (IS) Defn  Why IS? 1. Ensure business continuity 2. Reduce/prevent damage on business 3. Ensure preservation of confidentiality, integrity and availability of info. Also authenticity , accountability, non-repudation and reliability enhanced. 4. Interconnection of networks pose risk 5. Trends in distributed computing 6. Participation of customers/employees/stakeholder 7. Marketing of products/services 8. Internal management tool-for control & confidence 9. Dependence on Info systems-vulnerable to IS threats 10. Information, systems & networks are key business assets Dr Muliaro-ISMS 3
  • 4. Information Security Management System (ISMS)  Defination:-  that part of overall magmt system, based on business risk approach, to establish, implement, operate, monitor , review, maintain and improve info security.  A management process with 3 key components: ◦ Confidentiality-available to authorized only ◦ Integrity-accurate and complete Dr Muliaro-ISMS 4
  • 5. Information Types  Internal  Public  Private  Customer/client  Shared etc Dr Muliaro-ISMS 5
  • 6. Info security risks  Info theft  Intrusion and subversion of system resources  Denial of services  Loss  Corruption  Masquerade  Paper document  What are the most common IS mistakes made by individuals? Dr Muliaro-ISMS 6
  • 7. Common IS mistakes 1. Unattended comp. 1. Loose talk about left on p/word in public 2. Bad password 2. Getting into rush & etiquette-no default bypassing key 3. Laptops stolen security measures 4. Keeping p/words 3. Vague knowledge on post-it notes of security policy 5. Opening e-mail 4. Non-reporting of attachments from security violations strangers 5. Late in updating 6. Check in/out workers ethics Dr Muliaro-ISMS 7
  • 8. Selection of Controls  Its expenditure need to balance against business harm/risk  Common ones include: ◦ Data protection and privacy of personal information (15.1.4) ◦ Protection of org. records (15.1.3) ◦ Intellectual property rights (15.1.2) ◦ Information security policy document (5.1.1) ◦ Business continuity mgt (14) etc Dr Muliaro-ISMS 8
  • 9. ISO 27002:2005  Provides guidance on best practices for ISM  Prime objectives are: ◦ A common basis for organizations ◦ Build confidence in inter-organizational dealings  It defines a set of control objectives, controls and implementation guidance. Dr Muliaro-ISMS 9
  • 10. ISO 27001:2005  Specifies requirements for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving a documented ISMS  Its designed to ensure adequate security controls to protect info assets, and documenting ISMS  Applicable for assessment and certification Dr Muliaro-ISMS 10
  • 11. Clauses  Clause 4-8 are mandatory.  How would you ensure that management: ◦ Management is committed to IS? ◦ Establishes roles and responsibilities for IS? ◦ Provides training, awareness and competency? ◦ Carry out review of the ISMS? Dr Muliaro-ISMS 11
  • 12. PDCA Model: Establishment & Mgmt of ISMS (plan) 1. Scope and boundaries 2. Policy/objectives 3. Define risk assessment approach 4. Identify risk 5. Analyse and evaluate risks 6. Identify and evaluate options of risk treatment 7. Select control objectives and controls 8. Obtain mgmt approval on residual risk 9. Obtain mgmt authorization to implement and operate the ISMS 10. Prepare statement of applicability Dr Muliaro-ISMS 12
  • 13. PDCA Model: Implementation & Operation of ISMS (Do) 1. Formulate risk treatment plan 2. Implement risk treatment plan 3. Define how to measure effectiveness of selected controls 4. Implement controls selected to meet control objectives 5. Implement training and awareness 6. Manage operations and resources 7. Implement procedures and other controls Dr Muliaro-ISMS 13
  • 14. PDCA Model: Monitoring & reviewing of ISMS (Check) 1. Execute monitoring procedures and other controls 2. Undertake regular reviews of the effectiveness of ISMS 3. Measure effectiveness of controls 4. Review risks assessments at planned intervals 5. Review level of residual risk and identified acceptable risk 6. Internal ISMS audit/magmt review 7. Update security plans 8. Records actions and events Dr Muliaro-ISMS 14
  • 15. PDCA Model: Maintaining & Improving of ISMS (ACT) 1. Implement identified improvements 2. Take appropriate corrective and preventive actions 3. Communicate the actions and improvements 4. Ensure improvements achieve intended objectives Dr Muliaro-ISMS 15
  • 16. ISMS Critical Success Factors 1. Info security policy, objectives, and activities that reflect business objectives 2. An approach and framework to implementing, maintaining, monitoring, and improving IS that is consistent with org. culture 3. Visible support and commitment from all levels of management 4. A good understanding of the information security requirements, risk assessment, and risk management. 5. Effective marketing of IS to all managers, employees, and other parties to achieve awareness 6. Distribution of guidance on IS policy and std to all managers/employees/stakeholders 7. Funding IS management activites 8. Providing appropriate awareness , training, and education 9. Establishment of an effective IS incident mgmt process 10. Implementation of a measurement system for performance in IS mgmt and feedback info for improvment Dr Muliaro-ISMS 16
  • 17. JKUAT Information Security Policy (JISP)  The specific objectives of information security are to: ◦ Protect information resources from unauthorized access; ◦ Ensure the continuity of systems processing services; ◦ Guarantee the privacy and accuracy of information resources; ◦ Allow proper restoration of the functionality of damaged resources; ◦ Prevent and detect possible threats, violations and security incidents Dr Muliaro-ISMS 17