Posts Tagged ‘ISO 27001 Documents’

The ISO 27001 standard requires only four documented procedures: a procedure for the control of documents, a procedure for internal ISMS audits, a procedure for corrective action, and a procedure for preventive action.

ISO 27001 proceduresThe term “documented” means that “the procedure is established, documented, implemented and maintained”. The ISO 27001 procedures for the control of documents should define who is responsible for approving and revising ISO 27001 documents, identifying changes and status of the review, how to distribute the documents, etc. In other words, this ISO 27001 procedures must define how the organization’s the flow of documents will function.

The procedure for internal audits must define responsibilities for planning and conducting audits, how audit results are reported, and how the records are maintained. This means that the main rules for conducting the audit must be set.

The procedure for corrective action should define how the nonconformity and its cause are identified, how the necessary actions are defined and implemented, what records are taken, and how the review of the actions is performed. The purpose of this ISO 27001 procedure is to define how each corrective action should eliminate the cause of the nonconformity so that it wouldn’t occur again.

The procedure for preventive action is almost the same as the procedure for corrective action, the difference being that it aims at eliminating the cause of the nonconformity so that it wouldn’t occur in the first place. Because of their similarities, these two procedures are usually merged in one.

Therefore, the ISO 27001 procedures are becoming mandatory only if the risk assessment identifies unacceptable risks.

Advertisements

You have applied for ISO 27001:2013 Certification and you are about to undergo your Stage 1 audit. The auditor checks that your ISO 27001 documentation is up to the task. For many organizations, the documentation stage is the most time-consuming part of their ISO 27001 project. For some, documenting ISMS (Information Security Management System) can take up to 12 months.

Providing the ISO 27001:2013 Documentation for your information security management system (ISMS) is often the hardest part of achieving ISO 27001 Certification. ISO 27001 Documents can run into thousands of pages for more complex businesses.

To get started, there are three approaches to addressing ISO 27001 documentation:

ISO 27001 documents

1. Trial and error
Designing the ISMS yourself is very risky and the most time-consuming approach. An ISMS needs a huge amount of detail, and trial and error is a difficult way to tackle this task.

2. External expertise
The second approach is bringing external expert from experienced consultants. Though this offers a faster route than trial and error, it is substantially more expensive. ISO 27001 Consultants will need time to learn your systems and processes before they can start documenting them and any new systems or processes. The advantages of external expertise include considerable reduction of the risk of failure and overcoming resource issues.

3. ISO 27001 Documentation toolkits
ISO 27001 Documentation Toolkit can significantly reduce errors and save you a considerable amount of time and money. We highly recommend this approach and have designed a documentation toolkit that exactly meets the requirements of ISO 27001. The ISO 27001 Documentation Toolkit has been developed by ISO 27001 experts and provides all of the mandatory and supporting documentation templates you will require, and is more cost-effective than consultancy fees.

The toolkit includes:

  • A complete set of easy-to-use, customisable and fully ISO 27001-compliant documentation templates that will save you time and money;
  • Easy-to-use dashboards and gap analysis tools to ensure complete coverage of the Standard; and
  • Direction and guidance from expert ISO 27001 practitioners.

The ISO 27001 manual is a mandatory document for ISO 27001 Certification, which maintains Information Security Management System in organization. This is a roof document for ISMS, and it usually includes the ISMS scope, role(s) undertaken by the organization, exclusions from the standard, references to relevant documents, and the business process model.

Basically, there are two approaches for ISO 27001 Information Security Management System (ISMS) Manual:

a) The ISO 27001 Manual could be a document explaining how an organization will meet the ISO 27001 requirements and which procedures will be used in the ISMS, or

b) The ISO 27001 Manual could be a set of all the ISO 27001 documents that are produced for the ISMS – in practice, the idea would be to place all the policies, procedures, working instructions, forms, etc. into a single book so that it is easier to read.

The first approach makes no sense because there is a mandatory document in the ISMS that must describe how a company will implement its information security – it is called Statement of Applicability. It must list all the controls, and define if they are applicable and how they will be implemented. Therefore, the Statement of Applicability has a very similar function to that of the Quality Manual, so an ISO 27001 Manual with the same purpose makes no sense.

Having all the ISMS policies and procedures included into a single ISO 27001 manual makes even less sense – first of all, most companies implementing ISO 27001 use intranet for handling documents, so merging documents in electronic form makes them no easier to read; secondly, the longer the documents, the smaller the chance someone will read them because not every ISMS document is intended for everyone in an organization; and thirdly – since individual ISMS documents change rather often, it would be a nightmare to update such manual so frequently.

If you’re just starting to implement ISO 27001 in your business, you’re probably in a dilemma about how many ISO 27001 documents you need to have and whether you should write certain policies and procedures or not.

Criteria for deciding what to ISO 27001 Document

Well, the first step is simple: you have to check if the ISO 27001 Certification requires a document. If the ISO 27001 document is mandatory, you have nothing to think about; you have to write it if you want to compliant this standard.

Here are some criteria that will help you:

Risks: You need to start by assessing the risks to see if such control is needed. If there is no risk, then you certainly will not need a document for this; If there is a risk, this does not mean you have to write a document, but at least you have solved the dilemma if control is needed or not.

Compliance: Sometimes it is possible to have a regulation or a contractual requirement to write a specific document; For example, a regulation could require writing the classification policy.

Size of business: Small businesses will tend to have fewer documents, so you should avoid writing a procedure for each small process; For example, if it is a multinational organization with 10,000 employees, write policies in which each of them has a couple of related procedures, and then for each procedure a couple of work instructions; This approach makes sense.

Importance: The more important a process or activity is, the more likely it is to write a policy or procedure to describe it; this is because you want to be sure that everyone understands how to perform this process or activity in order to avoid interruptions in their operations.

Number of people involved: The more people perform a process or activity, the more likely you are to document it; For example, if there are 100 people involved, it will be very difficult to explain verbally to all these people how to perform a particular process; It is much easier to write a procedure that explains everything in detail. On the other hand, if you are involved in five people, you can probably explain how the whole process works in a single meeting, so you do not need a written procedure. However, there is one exception: if there is only one person working on a trial, you may want to document it because no one else knows how to do it, so if this person is no longer available, you can continue with your operations.

Complexity: The more complex the process, the more likely a written document is needed (at least in the form of a checklist); it is simply impossible to remember from memory

Maturity: If a process or activity is clearly established, if it has been performed for years and everyone knows exactly how to do it, if it has been developed, it is probably not necessary to document it.

Frequency: If you do some activities rarely, you can write them because you can forget how they are done.

ISO 27001 will help your company comply with increased government regulations and specific requirements of the industry difficult. Information is a valuable organizational asset that can make or break a company. When properly managed, it allows businesses to operate with confidence and gives them the freedom to grow, innovate and expand their customer base in the knowledge that all their confidential information remains that way.

ISO 27001 is intended to bring information security under management control to ensure that it meets and is maintained to continue to meet the requirements of the protection of information in the organization. Any certification standard documentation procedures are an important part of any management system as it clarifies the processes and management activities for system users and stakeholders including certification auditors.

ISO 27001 procedure for document control defines who is responsible for the approval of ISO 27001 documents and their revision, how to identify the changes and revision status, how to distribute the documents, etc. In other words, this procedure should define how the organization’s bloodstream (the flow of documents) will function. The procedure for internal audits must define responsibilities for planning and conducting audits, how audit results are reported, and how records are maintained. This means that the main rules of conduct of the audit must be addressed.

The corrective action procedure should define how the nonconformity and its cause are identified, how the necessary actions are defined and implemented, the records that are made, and how the consideration of the shares is made. The purpose of the ISO 27001 procedure for Information security is to define how each corrective action should eliminate the cause of the nonconformity so that it does not happen again. The ISO 27001 procedure for preventive action is almost the same as the procedure for corrective action, the difference being that it aims to eliminate the cause of the nonconformity so that it does not happen in the first place. Because of their similarities, these two procedures are usually merged into one.

ISO 27001 procedures for Information security management system taking following major parts:

  • It takes into account the market and legal or regulatory requirements and contractual security obligations ;
  • Procedures for ISO 27001 Information Security Management System includes a framework for setting objectives and establishes an overall sense of direction and principles of action with respect to information security;
  • Aligns with the context of strategic risk management organization in which the establishment and maintenance of the WSIS will take place;
  • Establishes criteria against which risk will be evaluated and;
  • Has been approved by management.

 

As part of your ISO 27001 Certification project, your organisation will need to prove its compliance with appropriate documentation. If you’re just starting to implement ISO 27001 in your company, you’re probably in a dilemma as to how many documents you need to have, and whether to write certain policies or not.

ISO 27001 Certification states that it is necessary to document an information security policy.

What is an information security policy?

Information Security Policy

An information security policy could be a set of rules or needs that govern however your organization and its employees will try to manage its digital resources and assets in a very safe manner. It is one of the mandatory ISO 27001 documents and sets out the requirements of your information security management system (ISMS).

The policy should be a short and simple document, approved by the board which defines management direction for information security in accordance with business requirements and relevant laws and regulations.

Key elements of your information security policy

An information security policy needs to reflect your organisation’s view on information security and must:

  • Provide information security direction for your organisation;
  • Include information security objectives;
  • Include information on how you will meet business, contractual, legal or regulatory requirements; and
  • Contain a commitment to continually improve your ISMS.

The ISO 27001 Policy should help drive your approach to scoping the ISMS and implementation project. An information security policy needs to include all employees in an organisation, and may also consider customers, suppliers, shareholders and other third parties. It’s important to consider how the policy will impact on these parties and the effect on your organisation as a result.

Help with creating an information security policy template

The information security policy is one of the most important documents in your ISMS.

Knowing where to start when compiling your information security policy can be difficult, especially in large or complex organisations where there may be many objectives and requirements to meet.

The ISO 27001:2013 Documentation Toolkit contains a customisable information security policy template for you to easily apply to your organisation’s ISMS.

While implementing ISO 27001 Certification for compliance to ISMS (information security management system) in your organisation may seem overwhelming, you can prepare yourself for creating and managing the documentation side. Content of an Information Security Policy is certainly one of the biggest myths related to ISO 27001 – very often the purpose of this document is misunderstood, and in many cases people tend to think they need to write everything about their security in this document.

The aim of ISO 27001:2013 Policy is to define the purpose, direction, principles and basic rules for information security management. It covers guideline for controls applied as per ISO 27001:2013 Certification guidelines. The policy document templates are provided to frame the information security controls as listed below.

List of Policies required for ISO 27001:2013 Certification

  1. Acceptable Use policy-Information Services
  2. Infrastructure Policy
  3. Policy For Access Card
  4. Back up Policy
  5. Clear desk and clear Screen Policy
  6. Physical Media & Disposal Sensitive Data
  7. Electronic Devices Policy
  8. Laptop Policy
  9. Password Policy
  10. Patch Management
  11. User registration Access Management
  12. Policy for working in Secured Areas
  13. Visitor Policy
  14. Work Station Policy
  15. Cryptographic Policy
  16. LAN Policy
  17. Training Policy
  18. Mobile Computing Policy
  19. Teleworking Policy
  20. Internet
  21. Messenger And E mail
  22. Change Control
  23. Freeware and Shareware Policy

The purpose of the Information Security Policy

In many cases, the executives have no idea as to how information security can help their organization, so the main purpose of the policy is that the top management defines what it wants to achieve with information security.

The second purpose is to create a document that the executives will find easy to understand, and with which they will be able to control everything that is happening within the ISMS – they don’t need to know the details of, say, risk assessment, but they do need to know who is responsible for the ISMS, and what to expect from it.

For such information related documentation process visit: ISO 27001 Documents